F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Thank you to everyone who attended

INTERFACE Boise 2025

Idaho's Premier Technology Event will return in 2026

INTERFACE Boise 2025

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Boise EVENTS

AT A GLANCE

August 28th, 2025
8:30am – 4:30pm

Boise Centre
Grand Ballroom
850 W. Front Street
Boise, ID 83702

Directions & Parking

Venue Accessibility

KEYNOTE: [1 CPE] Operation Cyber Idaho: Modernizing Cyber Defense Statewide

  Presented by Jerred Edgar • Chief Information Security Officer, State of Idaho

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Theater Three
  • Theater Four
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] A Complete Security Blueprint

  Presented by Chad Spoden, Solutions Architect Manager • FRSecure

In an era of increasingly sophisticated and relentless cyber threats, organizations must take a strategic and structured approach to security. This blueprint offers a comprehensive roadmap for building and maturing a security program—from establishing a solid foundation to addressing advanced threats and ensuring long-term resilience. Designed to be practical and accessible, it emphasizes clarity, prioritization, and continuous improvement. Whether you're launching a new initiative or refining an existing program, this guide highlights key considerations and provides actionable insights to strengthen your security posture and stay ahead of evolving risks.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Taking A Data-First Approach to Cyber Risk Management

  Presented by Austin Starowicz, Director, Solutions Consulting • Mastercard Cybersecurity

Cyber Risk Management has evolved. Every new vulnerability or regulation adds further pressures on already stretched teams to predict and manage the weakest links within your internal IT infrastructure. Piling on to today’s cyber risk landscape is the ever-expanding digital supply chain, and the need to onboard, assess, and monitor third parties, fourth parties, and Nth parties.

But does it really have to be that way?

Join this session from Mastercard Cybersecurity for an exclusive presentation on how a proactive “data-first” approach to cyber risk management can help you:

  • Improve monitoring for critical vulnerabilities to determine which ones really matter
  • Identify, Prioritize and Assess affected third parties in real-time
  • Leverage objective risk data into the decision-making processes
  • Streamline workflows and scale your operations
Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Go Hack Yourself: More War Stories from over 150,000 Pentests

  Presented by Tony Taylor, Sr Solutions Architect • Horizon3.ai

Join Tony Taylor, Senior Solutions Architect, for an engaging session on “Offense-Driven Defense.” Tony will challenge conventional risk assessment practices and unveil how focusing on real-world exploitability and impact can revolutionize your security approach. Drawing from insights gathered across more than 150,000 autonomous pentests, he’ll share compelling stories and actionable lessons that show how viewing your cyber terrain through an attacker’s lens can uncover hidden vulnerabilities, optimize resource allocation, and strengthen your defenses against advanced threats. Don’t miss this opportunity to learn from a leading industry practitioner on why it’s time to “go hack yourself” and build resilience in today’s borderless threat environment.

Topics: Information Security, Strategic Management
1:00 - 1:50 PM

[1 CPE] AI Agents & Automation: How They’re Changing the Way We Work

  Presented by Abram Erickson, Lead Data & AI Engineer, and Hunter Helfgott, AI Solutions Consultant • Cerium Networks

AI-powered agents are generating a lot of buzz. But what do they actually do?

In this session, you will see how organizations are starting to use AI-powered agents to solve business challenges and create new opportunities. We'll cover advanced tools like custom GPTs, Copilot Studio, and Azure AI Foundry and see how they can be leveraged to drive AI innovation and streamline workflows. This session offers a deep dive into automation's role in simplifying complex processes, enhancing customer experiences, and improving productivity.

Topics: Artificial Intelligence
2:00 - 2:50 PM

[1 CPE] How to Spend Wisely on Your IT Needs in Boise: An Interactive Panel Discussion

  Presented by INTERFACE Advisory Council

Your budget has shrunk, and vendor costs have risen. Sound familiar?

So many IT leaders in Boise are dealing with the challenges of vendor acquisitions that produce huge cost increases. At times it can seem there is no way to achieve everything expected with the budget allotted. How does anyone succeed in this environment?

Boise isn’t home to the largest corporations in the country, and your IT budget reflects that. In this panel discussion, the BOISE Advisory Council will share their tricks to maximizing the impact of the money you have to spend. Please join us for an open discussion that will include your questions. We will share experiences in working with vendors, stretching a dollar, and finding alternatives to huge price increases from the vendor community.

Moderator: Will Miller, Sr IT Manager, Idaho Transportation Dept

Panelists:

  • Lloyd Barron, Chief Information Security Officer, ID Secretary of State
  • Josh Borglund, Manager, Information Technology, Aviation Specialties Unlimited
  • Kevin Malloy, Chief Technology Officer, Dynamis Energy, LLC
  • Robert Peterson, Information Technology Director, Washington County, ID
Topics: Strategic Management
Jerred EdgarJerred EdgarChief Information Security Officer, State of Idaho
3:00 - 3:50 PM

[1 CPE] Operation Cyber Idaho: Modernizing Cyber Defense Statewide

  Presented by Jerred Edgar • Chief Information Security Officer, State of Idaho

Operation Cyber Idaho is an initiative focused on improving Idaho's cyber resilience through Idaho Readiness Training (IRT), cyber infrastructure services, and collective defense. This program aims to modernize infrastructure by establishing the Idaho Readiness Training program, developing a cybersecurity workforce via a statewide apprenticeship program, and offering comprehensive cyber infrastructure services such as threat detection, vulnerability scanning, and remediation efforts.

Jerred serves as the Chief Information Security Officer for the Idaho Office of Information Technology Services. Jerred has over 24 years of military service, with 20 of those years focused on managing, overseeing, and developing secure and redundant cyber capabilities for military operations within contested environments.

Before retiring, he served as the Director of Cyber Innovative Readiness Training (IRT) for the Idaho Army National Guard (IDARNG), where he established a strategic partnership across Idaho and within the Department of Defense. This partnership facilitated cyber assessments, consultations, and assistance by leveraging military readiness objectives, funding, and personnel from 2019 through 2024. Prior to this role, he held various leadership positions within the 116th Cavalry Brigade Combat Team (CBCT). His responsibilities included managing the 116th CBCT's enterprise communication suite for numerous training exercises and modernization efforts, two National Training Center rotations, Operation Saber Guardian 2016, and participating in two combat deployments since 2001.

Topics: Information Security, Strategic Management
  • Sessions
9:00 - 9:50 AM

[1 CPE] Hacking on a Budget: Maximizing Impact with Open-Source Security Tools

  Presented by Topher Lyons, Solutions Engineer • Sprocket Security

This presentation offers an illuminating glimpse into the open-source and free tools utilized by cybersecurity professionals for comprehensive security assessments. We will walk through how tools like Masscan, Nuclei, Impacket, Roadtools, Burp Suite Community Edition, and OWASP ZAP are applied across the essential phases of ethical hacking: reconnaissance, enumeration, exploitation, credential spraying, and web application testing. This talk is designed to build awareness of the sophisticated techniques and widely respected resources employed by experts in the field, providing valuable insights into the practical aspects of offensive security without the expectation of immediate proficiency.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Will AI Take Your Job? How Do You Ensure It Doesn’t?

  Presented by Joe Skeen, Solutions Architect • CompuNet

As artificial intelligence continues to evolve, its impact on the workforce is becoming increasingly profound. This presentation explores the reality behind the provocative claim that "AI will take your job," examining which industries and roles are most at risk and which are poised for growth. Attendees will gain insights into the skills that are becoming obsolete, the capabilities that remain uniquely human, and the emerging opportunities in an AI-driven economy. The session will provide practical strategies for adapting to technological disruption, including upskilling, embracing digital tools, and cultivating resilience. Participants will leave with a clear understanding of how to future-proof their careers and thrive in the age of intelligent machines.

Topics: Artificial Intelligence, Culture
11:00 - 11:50 AM

[1 CPE] Breaking Down Silos: Unify Assets, Minimize Attack Exposure

  Presented by Michael Rockey, Sr Sales Engineering Manager • Axonius

In today’s rapidly evolving security landscape, organizations face the challenge of managing a wide array of tools across endpoints, identities, and networks. While each tool serves a critical purpose, they often operate in isolation, creating silos that obscure visibility and expose vulnerabilities. This session will address how the fragmentation of security systems and data increases attack surfaces and how integrating a unified cyber asset management approach can significantly reduce attack exposure.

Join us as we explore how security professionals can move beyond disconnected tools to leverage a single, comprehensive view of their assets and threat exposures. We’ll highlight practical steps and present a preview of an end-to-end solution designed to break down silos, provide full cyber asset visibility, and enable a more holistic approach to minimizing security risks.

As technology continues to evolve, managing disparate security systems will remain a pressing challenge. This session will offer actionable insights to security professionals looking to streamline their approach and safeguard their organizations from the growing complexities of cyber threats.

Topics: Information Security
12:00 - 12:50 PM

[1 CPE] Securing Data Flow in the AI-Quantum Era

  Presented by Steve Riley, Vice President, Field CTO • Netskope

Sensitive data movement poses risks, but outright restriction can hinder operations. Organizations need agile security frameworks to protect data in the AI and quantum era. This session explores modern security platforms that enable secure data flow and prepare for post-quantum encryption (PQE).

Join this session to learn:

  • Choosing secure access methods for diverse use cases
  • Adapting security to risk, user behavior and AI interactions
  • Preparing for post-quantum encryption's enterprise impact
Topics: Artificial Intelligence, Information Security
1:00 - 1:50 PM

[1 CPE] History of Firewall Technology: From Packet Filtering to Application Control

  Presented by Hubert Ralph Bonnell, CISSP, CCSM – Security Engineer • Check Point Software

Let’s take a stroll through memory lane as we explore the history of the network firewall. This session explores the core technology behind packet filtering, proxies, stateful inspection, and application layer controls. Also covered are some of the fundamental differences between the firewalls on the market today.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Fortifying Data Resilience: When Backups Become Back Doors to Cyberthreats

  Presented by Rick Vanover, Vice President of Product Strategy • Veeam

Ransomware threats don’t discriminate. And as the industry’s leading provider of data resilience solutions, we’ve seen it all. Public sector organizations are just as likely to be targeted as those in the private sector, and the stakes can be even higher. Veeam’s latest Ransomware Trends Report exposes critical vulnerabilities and highlights why relying solely on backups is no longer enough to ensure resilience. In this session, Veeam’s VP of Product Strategy, Rick Vanover, will unpack the most common oversights that leave organizations — government, education, healthcare, and beyond — exposed to cyber threats, especially when backups become an overlooked back door in your security strategy.

Drawing from real-world incidents and hard-earned lessons, Rick will share what he wishes every IT professional knew before facing a ransomware or security breach event. You’ll leave with actionable insights, practical guidance, and research-backed recommendations to help you strengthen your data resilience. Whether you’re securing sensitive public sector data or safeguarding private enterprise information, this session will equip you to prepare for tomorrow’s threats today.

Topics: Business Continuity / Disaster Recovery, Data Management, Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] How to Make AI a Reality in Your Organization

  Presented by Marni Carmichael, Vice President, Marketing • ImageSource

AI adoption is accelerating, yet many organizations struggle to transition AI projects from proof-of-concept to production. The AI Empowerment Blueprint is a structured framework that helps businesses overcome common AI adoption barriers, align AI initiatives with business goals, and implement a governance strategy that ensures ethical and effective AI deployment.

This session will guide attendees through a six-step methodology for AI success, covering key phases such as AI exploration, business value alignment, governance frameworks, and implementation best practices. Learn how to identify AI opportunities, mitigate risks, and build a scalable AI strategy that delivers real business value.

Whether you're an executive, technologist, or entrepreneur, this presentation will equip you with actionable insights and a proven roadmap to maximize AI's impact within your organization.

Topics: Artificial Intelligence, Data Management
10:00 - 10:50 AM

[1 CPE] In the Cloud: Fast Forward to Better Security

  Presented by Jeff Kwiat, Principal Systems Engineer • Fortinet

Migrating to the cloud offers organizations unmatched agility, scalability, and innovation potential, but it also introduces complex security risks. Misconfigurations, compliance gaps, overly permissive identities, shadow IT, and advanced threats quickly erode the benefits of cloud adoption.

This presentation examines how to securely plan and execute a cloud migration, highlighting common challenges and best practices. It will explore how modern Cloud-Native Application Protection Platforms (CNAPPs) provide unified visibility, runtime protection, and compliance enforcement across multi-cloud environments. Attendees will learn how a well-architected, integrated security strategy not only mitigates risk but also accelerates the value of cloud transformation.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Modern Virtualization & Integrated Infrastructure from The Edge to the Core

  Presented by Blake Manard, Regional Sales Manager, and Mike O'Neil, Director of Solutions Architects • Scale Computing

In the new VMware/Broadcom reality, organizations everywhere face waves of uncertainty with escalating costs, forced VMware migrations, and unpredictable changes. Don’t let your IT strategy be held hostage by pricing and product instability. Join this session to discover future-proof solutions that eliminate the chaos and complexity.

Topics: Infrastructure
1:00 - 1:50 PM

[1 CPE] Modern Security: Quantum Computing, AI, and External Key Management in the Cloud

  Presented by Steven Gautier, Principal Solutions Architect • Thales

In this presentation, we will explore the emerging data threats posed by quantum computing and artificial intelligence and discuss their implications for data security. We will also delve into the advantages of external key management for cloud data, examining various strategies for protection, including encryption.

Join us to gain insights into the latest advancements in data security and learn how to safeguard your data against evolving threats.

Topics: Artificial Intelligence, Information Security
2:00 - 2:50 PM

[1 CPE] Threat Detection: Intelligence Insights from the Front Lines

  Presented by David Pier, Sr Sales Engineer • Red Canary

In 2024, Red Canary detected nearly 93,000 threats—an increase of more than a third from the previous year—driven by expanded visibility into cloud and identity infrastructure. For the seventh year, our Threat Detection Report analyzes the most prevalent cyber threats, evolving attack techniques, and the incidents we help customers resolve.

This session will highlight key trends, including email threats, infostealers, and LLM hijacking in the cloud, while breaking down the top 10 MITRE ATT&CK® techniques and most prevalent threats in customer environments. Attendees will gain actionable insights into detection, testing, and prevention strategies to enhance their security posture against today’s evolving threats.

Topics: Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] Beyond the Standard: How Aruba’s 700 Series APs Redefines Wi-Fi 7

  Presented by Stefanie Elle, Channel Sales Engineer • HPE Aruba Networking

Wi-Fi 7 is just the beginning. The HPE Aruba Networking 700 Series Access Points go beyond the standard with higher capacity, denser IoT support, advanced wired security with MACsec, software-configurable radios, and more. Powered by AOS-10 and Aruba Central, every Wi-Fi 7 model adds AI-driven optimization, sustainability automation, and deep client insights. The result is a unified platform that transforms next-gen wireless into the foundation for real-time business, IoT innovation, and future-ready connectivity. Join us to discover how the 700 Series goes beyond Wi-Fi 7 to deliver the performance, intelligence, and security your network demands.

Topics: Infrastructure
10:00 - 10:50 AM

[1 CPE] From Frameworks to Firewalls: A Practical Guide to AI Security

  Presented by Collin Miller, Director of Cloud Security, and Alex Owen, AI Solutions Engineer • Structured

As organizations accelerate AI adoption, the security landscape is evolving just as quickly. This presentation explores the foundations of AI security, starting with an overview of emerging AI-specific threats and the importance of structured defense approaches. We will examine leading frameworks—MITRE ATLAS and the NIST AI Risk Management Framework—and how they guide organizations in identifying, assessing, and mitigating AI risks.

We will then focus on Microsoft 365 Copilot, outlining its security architecture and built-in protections, followed by a technical case study on the Echo Leak vulnerability, demonstrating real-world exploitation risks.

Finally, we will provide an overview of Structured's AI security service offerings. Attendees will gain both strategic insights and practical approaches to securing AI systems, preparing them to meet the challenges of an AI-powered future.

Topics: Artificial Intelligence, Information Security
11:00 - 11:50 AM

[1 CPE] Real-Time Threat Mitigation with AI-Driven SASE: A Practical Approach

  Presented by Brian Anderson, Global Field CTO • Cato Networks

In this session, we’ll explore how a converged SASE platform combined with AI and machine learning (ML) enables real-time threat detection and mitigation, transforming network security from a reactive to a proactive model. The focus will be on how AI-driven solutions within the SASE framework can identify, analyze, and neutralize security threats in real-time across distributed environments.

Brian Anderson, Global Field CTO at Cato, has over 20 years’ experience in technology, working with networks, systems, application development, and security, specializing in automation. Brian has worked to architect, attack, integrate, and secure networks and applications for emergency notification systems, government environments, healthcare organizations, transactional and e-commerce, including multi-tier cloud-based solutions, and has had a focus on web, database, and network and infrastructure security for the past 13 years at Imperva.

Topics: Information Security, Infrastructure
1:00 - 1:50 PM

[1 CPE] Why Securing Active Directory and Entra ID is Critical in the Age of Escalating Cyber Threats

  Presented by Ryan Garrett, Sr Sales Engineer • Rubrik

In today’s threat landscape, identity-related attacks are rapidly increasing in both frequency and sophistication, targeting core identity engines like Active Directory and Entra ID. This presentation will explore the modern attacker’s playbook, walking through the typical kill chain and the potential impact on an organization’s environment, spanning on-premises infrastructure, cloud, and SaaS applications. We will analyze the limitations and risks associated with current protection strategies—such as relying on point solutions, exposed backup data, and the complexities of Active Directory and Entra ID restoration, which often involve multiple tools and intricate forest-level recoveries.

The session will emphasize the importance of breaking down silos between identity management, data protection, and security teams. Attendees will come away with practical recommendations for collaborative recovery planning, including the value of conducting mock exercises to ensure readiness. By understanding the evolving threats and rethinking recovery strategies, organizations can better defend their most critical digital assets.

Topics: Data Management, Information Security
2:00 - 2:50 PM

[1 CPE] Modern Data Center Network Automation

  Presented by Bill Wester, Sr Product Manager  • Juniper Networks

The presentation will focus on Juniper Apstra and Designing Data Centers with Intent. We will discuss the design, deployment, and operation of modern EVPN VXLAN data centers and talk about how machine learning and AI are helping to make data center operations easier for the operators. We hope that the attendees will take away a new appreciation of how modern automation can help solve the hardest data center problems with ease.

Topics: Artificial Intelligence, Data Center Technology

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Estureto Alonzo
Manager, Information Technology
ID Information Technology Services

Lloyd Barron
Chief Information Security Officer
ID Secretary of State

Lorraine Bessmer
Manager, Cybersecurity
St Luke’s Health System

Josh Borglund
Manager, Information Technology
Aviation Specialties Unlimited

Laurel Caldwell
Chief Information Officer
Latah County, ID

Michael Case
Manager, IT Service & Support
Blue Cross of Idaho

Brandon Cheyney
Sr Systems Administrator Supervisor
City of Nampa, ID

Jennifer Dvorak
Chief Information Officer
ID Courts

Matt Fuhrman
Manager, Information Security & Privacy
Your Health Idaho

Richard Gallegos
Director, Information Technology
Valley Wide Cooperative

Devonte Goodman
Director, Information Technology
City of Eagle, ID

Jon Harris
Director, Information Technology
Wright Brothers, The Building Company

Patti Henderson
Director, Information Technology
Givens Pursley LLP

Scott Knights
Chief Information Security Officer
ID Dept of Health & Welfare

Cody Kreps
Director, Information Services
Nampa School District

Kevin Malloy
Chief Technology Officer
Dynamis Energy, LLC

Jason Mertz
Vice President, Information Technology
Idaho First Bank

David Musgrave
Chief Information Officer
Kendall Auto Group

Marc Norton
Manager, Information Technology
ID State Tax Commission

Raul Pena
Director, Information Technology
Payette County, ID

Andrew Peterson
Sr Security Analyst
US Dept of Veterans Affairs

Robert Peterson
Director, Information Technology
Washington County, ID

Jason Povey
Chief Information Officer
Power County Hospital District

Morgan Poyser
Director, Information Technology
HB Specialty Foods

Dan Roberts
Director, Infrastructure, Cybersecurity
Western States Cat

Michael Rowell
Vice President, Information Technology
Turn-Key Medical

Cody Shepherd
Sr Manager, IT Operations
Idaho Power Company

Fred Warr
Manager, OIT Business Services
Boise State University

Rachel Zahn
Cybersecurity Analyst
Aura

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

Axonius

Axonius

Axonius
Axonius is an asset inventory management platform that focuses on cybersecurity solutions and policies.
Visit Website
Cato Networks

Cato Networks

Cato Networks
Cato provides the world’s most robust single-vendor SASE platform, converging Cato SD-WAN and a cloud-native security service edge, Cato SSE 360, into a global cloud service. Cato SASE Cloud optimizes and secures application access for all users and locations everywhere.
Visit Website
Cerium Networks

Cerium Networks

Cerium Networks
Cerium is a recognized innovator and leading provider of a full suite of collaboration, contact center, networking, data center, and security solutions. We help medium to large businesses in the Northwest plan for and then realize the positive impact of technology on their business operations, strategies, and user experiences.
Visit Website
Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
CompuNet

CompuNet

CompuNet
CompuNet is a leading U.S. information technology partner, headquartered in Boise, Idaho. The firm specializes in consultation, design and implementation services specifically tailored to solve business problems. With a best-in-class engineering staff and approach, CompuNet focuses on building lasting relationships that prioritize client satisfaction over sales through every step of the journey.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface & the power to take on the ever-increasing performance requirements of the borderless network – today and into the future.
Visit Website
FRSecure

FRSecure

FRSecure
FRSecure applies industry standards to assess existing information security programs (administrative, physical and technical security controls), and we develop, implement and manage information security programs tailored to each client’s specific security needs.
Visit Website
Horizon3.ai

Horizon3.ai

Horizon3.ai
Horizon3.ai enables organizations to continuously assess the security posture of their enterprise across many attack surfaces.
Visit Website
ImageSource

ImageSource

ImageSource
ImageSource is a software and systems integration firm specializing in Enterprise Content Management.
Visit Website
Mastercard Cybersecurity

Mastercard Cybersecurity

Mastercard Cybersecurity
Through unique threat intelligence and multi-layered, cloud-based defense technologies, Mastercard Cybersecurity helps organizations and consumers address risk in real-time, enhancing resilience against today’s most sophisticated cyberattacks.
Visit Website
Netskope

Netskope

Netskope
Netskope, a global SASE leader, helps organizations apply zero trust principles and AI/ML innovations to protect data and defend against cyber threats. The Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Learn how Netskope helps customers be ready for anything on their SASE journey, visit netskope.com.
Visit Website
Red Canary

Red Canary

Red Canary
The Red Canary Security Operations Platform, driven by purpose-built technology, security research, and threat intelligence, provides advanced threat detection and response across your entire IT estate to improve your security outcomes.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website
Scale Computing

Scale Computing

Scale Computing
Scale Computing's highly-automated edge infrastructure, virtualization platform, & hyperconverged solutions can handle all of your IT infrastructure needs.
Visit Website
Sprocket Security

Sprocket Security

Sprocket Security
Monitor risk and remediation efforts continuously in the new era of threat detection. Sprocket combines human expertise with automated solutions to provide a more scalable and reliable penetration testing solution.
Visit Website
Thales

Thales

Thales
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website

BRONZE SPONSORS

Adlumin

Adlumin

Adlumin
Adlumin's security and compliance automation platform helps organizations manage evolving threats and cybersecurity compliance requirements.
Visit Website
Cyera

Cyera

Cyera
The data security solution you've been waiting for. Cyera enables you to discover and classify data, protect it from exposure, and maintain a resilient posture.
Visit Website
eSentire

eSentire

eSentire
eSentire’s complete, multi-signal Managed Detection and Response services provide 24/7 cutting-edge protection to prevent cybercriminals from ever disrupting your business.
Visit Website
HPE

HPE

HPE
At Hewlett Packard Enterprise, we aim to be the industry’s leading provider of hybrid IT, built on the secure, next-generation, software-defined infrastructure that will run customers’ data centers today, bridge them to multi-cloud environments tomorrow, and power the emerging intelligent edge that will run campus, branch and Industrial IoT applications for decades to come. All delivered through a world class services capability.
Visit Website
Miicor

Miicor

Miicor
Miicor, Inc is a security solutions company serving the unique requirements and needs of customers throughout the Pacific Northwest.
Visit Website
Neat

Neat

Neat
Neat designs simple and elegant pioneering video devices for Microsoft Teams and Zoom Rooms, helping make the meeting space experience the best it can be. Continuously pushing boundaries, Neat devices are incredibly easy to install, set up and use.
Visit Website
NetBrain

NetBrain

NetBrain
Uncover risks and achieve proactive observability with NetBrain's turnkey, intent-based network automation platform for outage-free operations.
Visit Website
Right! Systems

Right! Systems

Right! Systems
Right! Systems, Inc. is an IT management services company that provides business-driven, multi-vendor IT solutions in Network Infrastructure, Virtualization, Storage, Unified Communications, Telepresence, Security, Mobility and Professional Services.
Visit Website
Sparklight Business

Sparklight Business

Sparklight Business
Sparklight Business offers the technology and tools you need to keep your employees productive, your customers happy and your business humming.
Visit Website
ValorC3

ValorC3

ValorC3
ValorC3 is a modern data center, cloud and connectivity partner that delivers agile, scalable IT solutions tailored to the relentless mid-market enterprise. Valor meets clients where they’re at and gets them where they need to grow, helping them navigate the rapidly changing digital landscape with flexible, high-density data centers, extensive infrastructure expansion capabilities, low latency networks, strong partnerships and decades of industry expertise.
Visit Website
VLCM

VLCM

VLCM
VLCM has been in business for over thirty years, and in that time, we’ve helped thousands of customers throughout the Rocky Mountain West find the proper solutions for their IT needs.
Visit Website

EXHIBITORS & ASSOCIATIONS

AuthentiFace

AuthentiFace

AuthentiFace
Authentiface secures digital and physical access with a resettable Facial Motion Password—two factors in one step with built-in liveness. Works with standard cameras for fast, hands-free, cost-effective authentication.
Visit Website
AVer Information

AVer Information

AVer Information
Founded in 2008, AVer provides award-winning education, healthcare, and video collaboration solutions. Explore PTZ, AI auto tracking, medical grade, USB, and document cameras at averusa.com. Follow us @AVerUSA.
Visit Website
Barracuda

Barracuda

Barracuda
Barracuda Networks is the worldwide leader in Security, Application Delivery and Data Protection Solutions. More than 200,000 global customers trust Barracuda to safeguard their employees, data, and applications from a wide range of threats. Barracuda provides easy, comprehensive and affordable solutions for email protection, application protection, network protection and data protection. We are continually innovating to deliver tomorrow’s security technology, today.
Visit Website
CISA

CISA

CISA
CISA is the Nation’s risk advisor, working with partners to defend against today’s threats and collaborating to build more secure and resilient infrastructure for the future.
Visit Website
CrowdStrike

CrowdStrike

CrowdStrike
CrowdStrike® provides cloud-delivered endpoint and workload protection. Leveraging artificial intelligence (AI), the CrowdStrike Falcon® platform protects customers against cyberattacks on endpoints and workloads on or off the network by offering visibility and protection across the enterprise.
Visit Website
Ednetics

Ednetics

Ednetics
For more than 25 years Ednetics has been on a mission to directly address the challenges faced by schools in acquiring and utilizing technology. Recognizing the close relationship between higher education, libraries, and technological advancements, we expanded our focus to serve the public sector and our technology portfolio has grown. From modernizing operations with communications, network, cybersecurity, and data infrastructure to improving safety with physical security solutions. Today, we proudly support and empower educational institutions, libraries, local and state governments throughout the Western US.
Visit Website
Fatbeam

Fatbeam

Fatbeam
Connect to What’s Next Reliability. Scalability. Service. When speeds and connectivity are guaranteed, you have less to worry about and more time to focus on what will move your organization forward. Fatbeam makes this possible. We help businesses scale with lit and dark fiber options that improve network performance while eliminating connectivity issues and access.
Visit Website
Halcyon

Halcyon

Halcyon
Halcyon formed in 2021 by a team of cybersecurity industry veterans after battling the scourge of ransomware (and advanced threats) for years, at some of the largest global security vendors. Halcyon is focused on building products and solutions for mid-market and enterprise customers.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
HPE Juniper Networking

HPE Juniper Networking

HPE Juniper Networking
Juniper Networks is now part of HPE. Together, we're building industry-leading, secure, AI-native networks – purpose-built with and for AI. As AI and networking converge, we're driving a bold transformation across enterprises, service providers, and cloud operators.
Visit Website
Idaho Technology Council

Idaho Technology Council

Idaho Technology Council
The mission of the Idaho Technology Council is to help technology companies in Idaho start, grow, and thrive. We are a member-driven organization committed to the success of Idaho’s technology ecosystem.
Visit Website
ISACA Boise

ISACA Boise

ISACA Boise
With more than 100,000 members in more than 180 countries, ISACA (www.isaca.org) is a recognized worldwide leader in IT governance, control, security and assurance.
Visit Website
Island

Island

Island
Meet Island, the Enterprise Browser that gives you control over SaaS governance, visibility and productivity. Secure your critical data and apps with Island.
Visit Website
ISSA Boise

ISSA Boise

ISSA Boise
The primary goal of the Information Systems Security Association, Inc. (ISSA) is to promote management practices that will ensure the confidentiality, integrity and availability of organizational information resources.
Visit Website
Keysight

Keysight

Keysight
Keysight delivers advanced visibility and validation solutions to connect and secure the world.  Visibility solutions (network packet brokers, taps and CloudLens) eliminate security blind spots in hybrid networks. Threat Simulator continuously validates enterprises’ security architectures to ensure they are working as defined to detect and stop threats.
Visit Website
Komprise

Komprise

Komprise
Komprise is the leader in unstructured data management. Analyze, tier, migrate, unlock data value. Optimize storage costs, feed AI data workflows.
Visit Website
Megaport

Megaport

Megaport
Megaport offers scalable bandwidth for public and private cloud connections, metro ethernet, Data Centre backhaul, and Internet Exchange Services.
Visit Website
Menlo Security

Menlo Security

Menlo Security
As a pioneer of browser security, Menlo Security delivers a solution with a comprehensive approach to enterprise browser security, protecting users where they work and securing applications from internet-borne attacks.
Visit Website
Momentum

Momentum

Momentum
Supercharge your business communications with Momentum. Access global internet connectivity and Teams Phone solutions.
Visit Website
MSPAA

MSPAA

MSPAA
The MSP Association of America (MSPAA) has been established with three primary missions, each of which follows a unique trajectory aimed at providing our clients, members, and students with a collaborative and informative pathway towards building a future for technology, business, and education.
Visit Website
NetApp

NetApp

NetApp
NetApp – Our team is data driven. You have a vision for digital transformation. We help you make it all possible.
Visit Website
Nutanix

Nutanix

Nutanix
Nutanix makes IT infrastructure invisible with an enterprise cloud platform that delivers the agility and economics of the public cloud, without sacrificing the security and control of on-premises infrastructure.
Visit Website
Optiv

Optiv

Optiv
Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website
PMI Western Idaho

PMI Western Idaho

PMI Western Idaho
The PMI Western Idaho Chapter’s mission is to advance the practice and profession of Project Management.
Visit Website
Qumulo

Qumulo

Qumulo
Qumulo, the leader in data-aware scale-out NAS, helps CIOs and storage administrators store, manage and curate enormous numbers of digital assets.
Visit Website
Syringa Networks

Syringa Networks

Syringa Networks
Syringa Networks is an industry-leading Managed Network Service Provider. We specialize in dedicated Internet, Voice, SD-WAN, Colocation, and Security. As a local provider, with more than 2,000 miles of fiber​, we deliver quick installs and access to live customer support, 24/7.
Visit Website
TPx Communications

TPx Communications

TPx Communications
TPx is your sidekick for smart IT—helping organizations connect, secure, and grow with confidence. Leveraging decades of experience, TPx delivers managed services for cybersecurity, networks, and cloud communications that reduce risk and maximize the value of IT investments.
Visit Website
Trace3

Trace3

Trace3
Trace3 is a full-service systems integrator, focused on business transformation through the deployment of innovative solutions. We offer solutions across the infrastructure spectrum (compute/network/storage/virtualization/cloud/security/data intelligence) which includes hardware, software, and professional services.
Visit Website
Waterfall Security

Waterfall Security

Waterfall Security
Waterfall Security provides OT security solutions for cyber-physical systems such as industrial control systems for critical infrastructures.
Visit Website

Interested in becoming part of our next Boise event?

CONTACT US FOR INFO

Boise

Boise Centre
Grand Ballroom
850 W. Front Street
Boise, ID 83702

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.