F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Thank you to everyone who attended

INTERFACE Salt Lake City 2025

Utah's Premier Technology Event will return in 2026

INTERFACE Salt Lake City 2025

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Salt Lake City EVENTS

AT A GLANCE

September 18th, 2025
8:30am – 4:30pm

Mountain America Expo Center
Exhibit Hall 3
9575 State Street
Sandy, UT 84070

Directions & Parking

KEYNOTE: [1 CPE] SEDI: The Search for Intelligent Identity

  Presented by George McEwan • Privacy Architect, Dept of Government Operations, State of Utah

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Theater Three
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] AI Agents & Automation: How They’re Changing the Way We Work

  Presented by Nate Purser, Data & AI Specialist, and Hunter Helfgott, AI Solutions Consultant • Cerium Networks

AI-powered agents are generating a lot of buzz. But what do they actually do?

In this session, you will see how organizations are starting to use AI-powered agents to solve business challenges and create new opportunities. We'll cover advanced tools like custom GPTs, Copilot Studio, and Azure AI Foundry and see how they can be leveraged to drive AI innovation and streamline workflows. This session offers a deep dive into automation's role in simplifying complex processes, enhancing customer experiences, and improving productivity.

Topics: Artificial Intelligence
10:00 - 10:50 AM

[1 CPE] Realizing AI Value Through Data Quality: Solving Hidden Barriers to Business-Ready AI

  Presented by Mark Brandow, Technical Expert, Digital Core • Hitachi Vantara

Mark Brandow is a Global Solutions Specialist at Hitachi Vantara, where he helps organizations modernize their digital core and unlock new value through data-driven innovation. With over 27 years in the IT industry—including 14 years as a telecommunications architect and operations manager—Mark brings a unique perspective as both a past customer and trusted advisor. For the past decade at Hitachi Vantara, he has focused on enabling businesses to align technology with strategic objectives through a consultative, insight-driven approach. Today, Mark is helping customers explore the transformative potential of Hitachi IQ, Hitachi Vantara’s AI solution, by driving adoption strategies that foster trust, accelerate decision-making, and deliver measurable outcomes.

Topics: Artificial Intelligence, Data Management
11:00 - 11:50 AM

[1 CPE] Go Hack Yourself: More War Stories from over 150,000 Pentests

  Presented by Jake Mickley, Sr Solutions Architect • Horizon3.ai

Join Jake Mickley, Senior Solutions Architect, for an engaging session on “Offense-Driven Defense.” Jake will challenge conventional risk assessment practices and unveil how focusing on real-world exploitability and impact can revolutionize your security approach. Drawing from insights gathered across more than 150,000 autonomous pentests, he’ll share compelling stories and actionable lessons that show how viewing your cyber terrain through an attacker’s lens can uncover hidden vulnerabilities, optimize resource allocation, and strengthen your defenses against advanced threats. Don’t miss this opportunity to learn from a leading industry practitioner on why it’s time to “go hack yourself” and build resilience in today’s borderless threat environment.

Topics: Information Security, Infrastructure, Strategic Management
1:00 - 1:50 PM

[1 CPE] Enhancing Cyber Resilience for Active Directory (and Entra ID)

  Presented by Rob Ingenthron, Sr Solution Engineer • Semperis

Cyberattackers are adept at finding ways through your defenses and into identity systems like Active Directory. Many organizations use Active Directory as the primary identity service, and Active Directory is typically tied into almost everything, including Entra ID. From there, they can move laterally, escalate privileges, access sensitive resources, and inject malware or ransomware. Implementing a layered defense that includes identity threat detection and response (ITDR) is key to protecting your operational resilience.

Join Rob Ingenthron, Sr Solution Engineer, to learn:

  • How layered defense has changed over time
  • Why ITDR is now an essential part of a robust layered defense strategy
  • The continuing importance of hygiene and auditing for Active Directory
  • How a layered defense can help you combat attacks that are designed to bypass traditional methods of defense
  • Which best practices lead to a strong layered defense
Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Has Security Awareness Been Forgotten? An Interactive Panel Discussion

  Presented by INTERFACE Advisory Council

“Just automate that process! The firewall is fine—we’ve got an AI tool watching it.”

Sound familiar? Despite significant investments in cybersecurity and advanced tools, the human element remains one of the greatest vulnerabilities in any organization. This isn't a new problem—ransomware attacks continue to thrive due to human error.

Insider threats, whether intentional or accidental, are often at the root of security breaches. So, what proactive steps are you taking to mitigate these risks?

Join the INTERFACE Salt Lake City Advisory Council for an engaging discussion on defending against internal threats. Local IT leaders will share their strategies, lessons learned, and practical tips for minimizing human error in cybersecurity. Bring your questions and join the conversation as we explore what’s working, what’s not, and what more needs to be done to protect our networks from within.

Moderator: Bryan Wilkins, Sr Manager-Information Security, Space Dynamics Laboratory

Panelists:

  • James Duckett, Assistant Operations Director, Technology Division, City of St. George
  • Michael Hughes, Director, Information Technology, Mission Health Services
  • Mike O'Rourke, Manager, IT Operations, Tata Chemicals North America
  • Greg Pugh, Manager, COMSEC, Space Dynamics Laboratory
Topics: Information Security, Strategic Management
George McEwanGeorge McEwanPrivacy Architect, Dept of Government Operations, State of Utah
3:00 - 3:50 PM

[1 CPE] SEDI: The Search for Intelligent Identity

  Presented by George McEwan • Privacy Architect, Dept of Government Operations, State of Utah

This presentation will cover the groundbreaking legislation enacted by Utah, which sets down the acceptable standards for digital identity with privacy and individual control by default. In this session, you'll learn about the principles enshrined in law. Additionally, you'll get exposure to the envisioned technology stack that will make it possible for individuals to maintain control over their data and how it is disclosed.

George McEwan is a multi-disciplined engineer and inventor credited with several US patents. As a husband, father, soldier, pilot, international traveler, and published author, he has more than a few ideas on how to unlock the value of digital government.

George is currently serving as the Privacy Architect for the State of Utah in the Department of Government Operations. Prior to taking on the challenges of his current role, George was the Chief Strategy Officer for the Division of Technology Services. He is uniquely qualified to advocate on behalf of the digital citizen as he served as the IT Director for the Department of Health during the pandemic, where he witnessed firsthand how the digital divide fractured communities.

Combining his talents as a technologist and award-winning storyteller, George promotes improved government transparency in data collection and the introduction of privacy-preserving verifiable digital credentials in venues across the United States.

Topics: Data Management, Strategic Management
  • Sessions
9:00 - 9:50 AM

[1 CPE] Data Security: Why Now?

  Presented by Michael ‘Fergo’ Ferguson, Principal Strategist, Security Services & Evangelist • Cyera

In an era of exponential data growth, fueled by GenAI and data democratization, the need for strong data security has never been greater. Join this session to explore how organizations can safeguard sensitive data while still driving innovation and agility, including:

  • Strategies for balancing robust data protection with business enablement in a fast-changing digital environment.
  • Approaches to tackling the unique security challenges introduced by GenAI and expanded enterprise data access.
  • Tactics for aligning key stakeholders and building consensus around data security priorities.

Michael Ferguson, known as Fergo, is the Data Security Services Strategist at Cyera. With 20 years of experience in Data, Web, Cloud, and Email Security technologies, he specializes in Data Security and Zero Trust initiatives. As the author of Netskope’s SASE Accreditation, Cyera DSPM Security Architect accreditation, Fergo has played a key role in shaping data security strategies for multinational organizations across the UK, Germany, Australia, and the USA.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Taking A Data-First Approach to Cyber Risk Management

  Presented by Austin Starowicz, Director, Solutions Consulting • Mastercard Cybersecurity

Cyber Risk Management has evolved. Every new vulnerability or regulation adds further pressures on already stretched teams to predict and manage the weakest links within your internal IT infrastructure. Piling on to today’s cyber risk landscape is the ever-expanding digital supply chain, and the need to onboard, assess, and monitor third parties, fourth parties, and Nth parties.

But does it really have to be that way?

Join this session from Mastercard Cybersecurity for an exclusive presentation on how a proactive “data-first” approach to cyber risk management can help you:

  • Improve monitoring for critical vulnerabilities to determine which ones really matter
  • Identify, Prioritize and Assess affected third parties in real-time
  • Leverage objective risk data into the decision-making processes
  • Streamline workflows and scale your operations
Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Beyond the Hype: AI Agents at Work

  Presented by Nate Purser, Data & AI Specialist, Cerium Networks and Isha Desai, Data & AI Technical Specialist, IBM

This session is designed to demonstrate what’s truly possible with AI agents and intelligent automation. We’ll explore real-world use cases from Cerium’s clients and highlight how IBM is applying agentic AI within their own organization. For example, IBM’s “AskIT” Agent now resolves 80% of common IT issues for their global workforce.

Cerium and IBM AI experts will also cover how organizations can create and manage AI agents that work across different large language models, automation tools, and applications. We’ll highlight practical approaches, governance and orchestration strategies that all organizations can apply as they begin or expand their AI journey.

Whether you’re just starting to explore AI agents or already testing them, this session will provide concrete examples, lessons learned, and practical strategies to help you take the next steps in adopting Agentic AI.

Topics: Artificial Intelligence
12:00 - 12:50 PM

[1 CPE] Corporate Resiliency in the Age of Ransomware

  Presented by Ritchie Blount, Lead Technical Expert, Cyber Resiliency & Security • Hitachi Vantara

Ritchie Blount is a seasoned cybersecurity professional with deep expertise in cyber resiliency, enterprise defense architecture, and security risk management. As a Lead Technical Expert, Ritchie has spent over two decades designing and implementing resilient frameworks that safeguard mission-critical systems & data structures against advanced threats.

With a career grounded in both technical innovation and strategic leadership at Microsoft, Dell, and now Hitachi, Ritchie has guided cross-functional teams in high-stakes environments, delivering scalable solutions that meet today’s evolving cyber challenges. His work bridges the gap between policy, technology, and operational effectiveness –– ensuring organizations stay secure, adaptable, and resilient.

As trusted advisor to government and industry partners alike, Ritchie brings clarity to complex security issues on topics including threat mitigation, incident response planning, and zero trust architecture.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Securing AI Without Slowing Innovation: A Blueprint for the Future of Cybersecurity

  Presented by Yama Sadaat, Sr Solutions Engineer • Trend Micro

AI is transforming the enterprise—bringing new opportunities for efficiency, but also introducing unprecedented risks. From prompt injection and model poisoning to shadow AI and deepfakes, the attack surface is evolving faster than most IT teams can keep up. In this session, we’ll explore Trend Micro’s Security for AI Blueprint, a step-by-step framework for protecting data, models, infrastructure, and users in an AI-driven world. You’ll also see how Trend Micro leverages AI across its own cybersecurity platform, combining decades of research with modern generative AI to deliver proactive protection. Walk away with practical strategies you can apply to safeguard your organization’s AI initiatives—without putting innovation on hold.

Topics: Artificial Intelligence, Information Security
2:00 - 2:50 PM

[1 CPE] Blind Spots in Cybersecurity: Identifying Hidden Risks in Your Environment

  Presented by Tanner Harrison, Systems Engineer • Fortinet

In this session, we’ll explore where hidden risks often lurk and share practical strategies to identify, address, and prevent them. From proven techniques to close security gaps to Zero-Trust and cloud-first solutions, you’ll leave with actionable insights to strengthen your defenses and build a more resilient, proactive security posture.

Key Takeaways:

  • Pinpoint common areas where security blind spots exist in organizations
  • Proven techniques to close critical gaps and reduce exposure
  • Insights for continuously monitoring and responding to evolving threats in real time
  • Practical steps for fostering a proactive, security-first culture across your organization
Topics: Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] Crisis to Confidence: Enhance Your Incident Response & Recovery with Data Protection

  Presented by Zach Wood, Solutions Architect • Druva

In today’s threat landscape, resilience isn't just about bouncing back—it's about bouncing forward. Join us for a dynamic session that redefines how organizations approach data protection, recovery, and cyber resilience.

Discover why traditional backup is no longer enough and how modern, SaaS-native strategies can eliminate blind spots, reduce risk, and give you a real competitive edge. We'll explore the forces reshaping security and IT teams, expose the gaps legacy tools leave behind, and walk through real-world use cases that show how leading organizations are transforming reactive recovery into proactive resilience.

Whether you’re navigating ransomware threats, managing sprawling SaaS ecosystems, or trying to do more with less, this session will equip you with a practical path to greater confidence and control.

Zach Wood is a seasoned Solutions Architect with over 25 years of experience in data protection, encompassing roles as both a customer and sales engineer. For the past four years, he has been an integral part of Druva, a leader in cloud data protection and management solutions, where he leverages his extensive expertise to assist organizations in safeguarding their critical data assets.

Topics: Business Continuity / Disaster Recovery, Information Security
10:00 - 10:50 AM

[1 CPE] Beyond the Standard: How Aruba’s 700 Series APs Redefines Wi-Fi 7

  Presented by Stefanie Elle, Channel Sales Engineer • HPE Aruba Networking

Wi-Fi 7 is just the beginning. The HPE Aruba Networking 700 Series Access Points go beyond the standard with higher capacity, denser IoT support, advanced wired security with MACsec, software-configurable radios, and more. Powered by AOS-10 and Aruba Central, every Wi-Fi 7 model adds AI-driven optimization, sustainability automation, and deep client insights. The result is a unified platform that transforms next-gen wireless into the foundation for real-time business, IoT innovation, and future-ready connectivity. Join us to discover how the 700 Series goes beyond Wi-Fi 7 to deliver the performance, intelligence, and security your network demands.

Topics: Infrastructure
11:00 - 11:50 AM

[1 CPE] Modern Data Center Network Automation

  Presented by Jeremy Wallace, Director Product Management, Data Center/IP Fabric Architect  • Juniper Networks

The presentation will focus on Juniper Apstra and Designing Data Centers with Intent. We will discuss the design, deployment, and operation of modern EVPN VXLAN data centers and talk about how machine learning and AI are helping to make data center operations easier for the operators. We hope that the attendees will take away a new appreciation of how modern automation can help solve the hardest data center problems with ease.

Topics: Artificial Intelligence, Data Center Technology
12:00 - 12:50 PM

[1 CPE] Achieving and Maintaining Compliance: A How to Guide

  Presented by Structured

Governance, Risk, and Compliance (GRC) frameworks are essential for organizations seeking to align business operations with regulatory expectations, mitigate risk, and demonstrate accountability. Yet, many enterprises struggle with fragmented processes, overlapping requirements, and the constant evolution of regulatory landscapes. This presentation explores the common challenges organizations face in meeting compliance obligations, including resource constraints, unclear ownership, and the difficulty of sustaining ongoing compliance rather than treating it as a one-time exercise. Attendees will gain insight into practical, repeatable steps for addressing audit findings, closing gaps, and building a culture of compliance that is both resilient and adaptable. By leveraging structured risk assessments, continuous monitoring, and cross-functional collaboration, organizations can move beyond reactive firefighting and achieve a proactive, sustainable GRC posture.

1:00 - 1:50 PM

[1 CPE] Anatomy of a Ransomware Attack: Prepare, Respond, Recover

  Presented by Torry Williams, Lead Solutions Architect • 11:11 Systems

Recovery plans are no longer optional—they’re inevitable. In today’s evolving threat landscape, every business will be tested. Whether it’s traditional disasters driven by nature or human error, or modern-day crises fueled by cyberattacks and ransomware, the stakes are higher than ever.

How do you ensure your organization is prepared not just to survive, but to recover with confidence? In this session, we’ll cover:

  • The key stages of a cyberattack and what they mean for your business
  • Best practices to reduce your exposure and minimize impact
  • Essential tools and strategies to recover quickly if compromised
  • What a real-world recovery looks like—and how to be ready for it
Topics: Business Continuity / Disaster Recovery
2:00 - 2:50 PM

[1 CPE] Let’s Talk About the Realities of Security Partnerships

  Presented by Chris Reid, Cybersecurity Strategist, CISSP • MicroAge

Whether you’ve been in the security space for two months or two decades, chances are you’ve worked with a variety of partners, VARs, and resellers. Maybe you’ve followed a trusted rep to a new organization or adapted to someone new after they moved on. We’ve all been there — and there’s no right or wrong approach.

But here’s the challenge: every partner has their own agenda, preferred vendors, and frameworks. So how do you avoid getting caught in the cycle of:

  • Constantly ripping and replacing hardware and software
  • Navigating conflicting security frameworks
  • Wondering if your “experts” are truly advocating for you
  • Questioning how agnostic their recommendations really are
  • And asking yourself — are they actually listening?

Join us for a candid conversation on how to evaluate vendors, manage relationships, set clear expectations, and recognize when your needs — your budget, your time, and your company’s culture — are truly being considered.

Let’s explore how empathy, transparency, and strategy can reshape how we engage with security partners.

Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Aaron Bentley
Chief Information Officer
City of Salt Lake, UT

Ron Boyer
Director, Information Technology
Summit County, UT

Dave Carlson
Chief Information Officer
The Wasatch Group

John Coker
Manager, Information Systems
Central Utah Water Conservancy District

James Duckett
Manager, Technology Division
City of St. George, UT

Rob Frailey
Manager, Information Systems
Utah Medical Products

Brandon Hansen
Director, Information Technology
Whitaker Construction

Daniel Harmuth
Chief Information Officer
Rocky Mountain University of Health Professions

Steve Howard
Principal Cyber Information Assurance Analyst
Northrop Grumman

Michael Hughes
Director, Information Technology
Mission Health Services

Mary Huth
Sr Manager, Internal Audit
Protiviti

Robert Irizarry
Director, Technology Security Risk & Controls
Franklin Templeton Investments

Waqas Javed
Director, Information Technology
Utah Zoological Society

Sylvia Jessen
Director, Information Technology
University of Utah School of Medicine

Keith Keller
Director, Information Technology
Box Elder County, UT

Brent Mair
Director, Network and IT Security
Focus Services

George McEwan
Chief Strategy Officer
State of Utah

Mike O’Rourke
Manager, IT Operations
Tata Chemicals North Amarica

Bobette Phillips
Director, Information Systems & Security
UT Tax Commission

Jason Povey
Chief Information Officer
Power County Hospital District

Greg Pugh
Information System Security Officer
Space Dynamics Laboratory

Vincent Romney
Deputy Chief Information Security Officer
Nu Skin & Pharmanex

Scott Rushforth
Chief Operations Officer
Horizon Credit Union

Mike Saldivar
Manager, Information Systems
Journal Technologies

John Stevens
Manager, IT Operations
Iron Road

Nyle Stoddard
Manager, Information Security
RR Donnelley

George Sturua
Manager, Corporate IT
Kuhl Clothing Company

Tyler Tholen
Sr Manager, Cybersecurity
Honeywell

Royce Wilkerson
Director, Information Technology
Brigham City Corporation

Bryan Wilkins
Manager, Enterprise Information Security
Space Dynamics Laboratory

Danny Yeo
Director, Information Technology
Brigham Young University

Shawn Young
Director, Cybersecurity
Barnes Group, Inc.

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Cerium Networks

Cerium Networks

Cerium Networks
Cerium is a recognized innovator and leading provider of a full suite of collaboration, contact center, networking, data center, and security solutions. We help medium to large businesses in the Northwest plan for and then realize the positive impact of technology on their business operations, strategies, and user experiences.
Visit Website
Hitachi Vantara

Hitachi Vantara

Hitachi Vantara
Hitachi Vantara helps enterprises create and derive value from their data. Its solutions include best-in-class data management, IT infrastructure and analytics products, IoT solutions and Smart Spaces technologies for a broad range of industries.
Visit Website
Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

11:11 Systems

11:11 Systems

11:11 Systems
11:11 Systems is creating a new model delivering the power of "Everything Connected" in connectivity, cloud, and security solutions for customers and partners.
Visit Website
Cyera

Cyera

Cyera
Cyera is the AI Security Platform built for the age of agents. Enterprises like Paramount, Chipotle, and Valvoline use Cyera to control exactly what data their AI can reach—and govern what happens next. The platform secures data at rest, in motion, and in use, whether touched by humans or AI agents. Valued at $9 billion and backed by over $1.7 billion from top-tier investors including Accel, Blackstone, and Sequoia. Protect your data. Secure AI.
Visit Website
Druva

Druva

Druva
Druva™️ delivers data protection & management for the cloud era. Druva Cloud Platform is built on AWS & offered as-a-Service & drives down costs by up to 50 percent, delivering globally accessible, scalable & autonomous enterprise data resiliency.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet helps organizations across the public and private sectors protect the systems, data, and services that keep businesses and communities running. From government agencies and schools to enterprises and service providers, leaders rely on Fortinet to secure critical infrastructure, ensure operational continuity, and defend against evolving cyber threats. Our Security Fabric platform unifies networking and security to deliver the visibility, control, and efficiency organizations need to operate confidently, whether virtual, in the cloud, or on-premises.
Visit Website
Horizon3.ai

Horizon3.ai

Horizon3.ai
Horizon3.ai enables organizations to continuously assess the security posture of their enterprise across many attack surfaces.
Visit Website
Mastercard Cybersecurity

Mastercard Cybersecurity

Mastercard Cybersecurity
Through unique threat intelligence and multi-layered, cloud-based defense technologies, Mastercard Cybersecurity helps organizations and consumers address risk in real-time, enhancing resilience against today’s most sophisticated cyberattacks.
Visit Website
MicroAge

MicroAge

MicroAge
Discover how MicroAge can help your business succeed with technology solutions, from managed services to cybersecurity and IT infrastructure.
Visit Website
Semperis

Semperis

Semperis
Semperis is the industry's most comprehensive Active Directory security and recovery platform, protecting hybrid AD environments from identity-based attacks.
Visit Website
Trend Micro

Trend Micro

Trend Micro
Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information.
Visit Website

BRONZE SPONSORS

Adlumin

Adlumin

Adlumin
Adlumin's security and compliance automation platform helps organizations manage evolving threats and cybersecurity compliance requirements.
Visit Website
Commvault

Commvault

Commvault
Commvault is a worldwide leader in delivering data readiness. Commvault's backup and recovery software enables you to protect, manage, and use your data, while managing it in a consistent, compliant way.
Visit Website
CompuNet

CompuNet

CompuNet
CompuNet is a leading U.S. information technology partner, headquartered in Boise, Idaho. The firm specializes in consultation, design and implementation services specifically tailored to solve business problems. With a best-in-class engineering staff and approach, CompuNet focuses on building lasting relationships that prioritize client satisfaction over sales through every step of the journey.
Visit Website
eSentire

eSentire

eSentire
eSentire’s complete, multi-signal Managed Detection and Response services provide 24/7 cutting-edge protection to prevent cybercriminals from ever disrupting your business.
Visit Website
ValorC3

ValorC3

ValorC3
ValorC3 is a modern data center, cloud and connectivity partner that delivers agile, scalable IT solutions tailored to the relentless mid-market enterprise. Valor meets clients where they’re at and gets them where they need to grow, helping them navigate the rapidly changing digital landscape with flexible, high-density data centers, extensive infrastructure expansion capabilities, low latency networks, strong partnerships and decades of industry expertise.
Visit Website

EXHIBITORS & ASSOCIATIONS

AIM Utah

AIM Utah

AIM Utah
Our carefully designed programs develop leadership, inspire innovative thinking, and establish networks of IT leaders to provide support and ideas. Our programs allow members to learn and share best practices and improve the value of IT to their organization.
Visit Website
ARMA Salt Lake City

ARMA Salt Lake City

ARMA Salt Lake City
Information is at the center of everything an organization does. Records are information assets and hold value for the organization. ARMA International is the authority on managing records and information paper and electronic.
Visit Website
AuthentiFace

AuthentiFace

AuthentiFace
Authentiface secures digital and physical access with a resettable Facial Motion Password—two factors in one step with built-in liveness. Works with standard cameras for fast, hands-free, cost-effective authentication.
Visit Website
Cohesity

Cohesity

Cohesity
Cohesity delivers a web-scale platform that simplifies data protection, consolidates file and object services, provides instant access to test/dev copies, spans from the edge to the cloud, and performs in-place searches and analytics.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
HPE Juniper Networking

HPE Juniper Networking

HPE Juniper Networking
Juniper Networks is now part of HPE. Together, we're building industry-leading, secure, AI-native networks – purpose-built with and for AI. As AI and networking converge, we're driving a bold transformation across enterprises, service providers, and cloud operators.
Visit Website
IBM

IBM

IBM
For more than a century, IBM has been a global technology innovator, leading advances in AI, automation and hybrid cloud solutions that help businesses grow.
Visit Website
Invite Networks

Invite Networks

Invite Networks
Explore INVITE Networks managed IT services in Salt Lake City. We are your trusted resource for comprehensive IT solutions, including MSP, collaboration, cybersecurity, and more. Learn how we can support your business.
Visit Website
ISACA Utah

ISACA Utah

ISACA Utah
The aim of the ISACA Utah Chapter is to sponsor local educational seminars and workshops, conducts regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the area.
Visit Website
ISC2 Salt Lake City

ISC2 Salt Lake City

ISC2 Salt Lake City
The International Information Systems Security Certification Consortium, Inc., (ISC)²®, is the global, not-for-profit leader in educating and certifying information security professionals throughout their careers.
Visit Website
Island

Island

Island
Meet Island, the Enterprise Browser that gives you control over SaaS governance, visibility and productivity. Secure your critical data and apps with Island.
Visit Website
MSPAA

MSPAA

MSPAA
The MSP Association of America (MSPAA) has been established with three primary missions, each of which follows a unique trajectory aimed at providing our clients, members, and students with a collaborative and informative pathway towards building a future for technology, business, and education.
Visit Website
Nutanix

Nutanix

Nutanix
Nutanix makes IT infrastructure invisible with an enterprise cloud platform that delivers the agility and economics of the public cloud, without sacrificing the security and control of on-premises infrastructure.
Visit Website
Pentera

Pentera

Pentera
Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers including their ransomware readiness, unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. In 2020, Pentera was chosen by Gartner as a Cool Vendor in the Security Operations and Threat Intelligence report.
Visit Website
PMI Northern Utah

PMI Northern Utah

PMI Northern Utah
PMI is the international non-profit association for advancing the profession of project management. The organization administers the Project Management Professional (PMP) certification program and puts on international and regional seminars.
Visit Website
Women Tech Council

Women Tech Council

Women Tech Council
Founded in 2007, the Women Tech Council provides mentoring, visibility and networking for women. The community is built for women who currently work for technology companies, and for those that may work for in technology roles in other market sectors.
Visit Website

Interested in becoming part of our next Salt Lake City event?

CONTACT US FOR INFO

Salt Lake City

Mountain America Expo Center
Exhibit Hall 3
9575 State Street
Sandy, UT 84070

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.