F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Thank you to everyone who attended

INTERFACE Omaha 2025

Nebraska's Premier Technology Event will return in 2026

INTERFACE Omaha 2025

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Omaha EVENTS

AT A GLANCE

November 6th, 2025
8:30am – 4:30pm

CHI Health Center Omaha
South Ballroom
455 N. 10th Street
Omaha, NE 68102

Directions & Parking

Venue Accessibility

KEYNOTE: [1 CPE] Exponential Mindfulness: Harness the Power You Already Have!

  Presented by Derek Kruse • Chief Information Officer, Douglas Omaha Technology Commission

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Theater Three
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Has Security Awareness Been Forgotten? An Interactive Panel Discussion

  Presented by INTERFACE Advisory Council

“Just automate that process! The firewall is fine—we’ve got an AI tool watching it.”

Sound familiar? Despite significant investments in cybersecurity and advanced tools, the human element remains one of the greatest vulnerabilities in any organization. This isn't a new problem—ransomware attacks continue to thrive due to human error.

Insider threats, whether intentional or accidental, are often at the root of security breaches. So, what proactive steps are you taking to mitigate these risks?

Join the INTERFACE Omaha Advisory Council for an engaging discussion on defending against internal threats. Local IT leaders will share their strategies, lessons learned, and practical tips for minimizing human error in cybersecurity. Bring your questions and join the conversation as we explore what’s working, what’s not, and what more needs to be done to protect our networks from within.

Panelists:

  • Rob LaMagna-Reiter, Chief information Security Officer, Woodman Life
  • Dr. Lisa McKee, Assistant Professor Cybersecurity, Bellevue University
  • Memory Trosper, Sr Director, Technology Services, Gothenburg Health
  • Dana Turner, Chief Information Security Officer, Union Bank and Trust
Topics: Information Security, Strategic Management
10:00 - 10:50 AM

[1 CPE] Beyond Cybersecurity: Assembling Resiliency for the Inevitable Breach

  Presented by BJ Deonarain, Global Alliance Cybersecurity Solutions Director • Hitachi Vantara

The Imperative for Resiliency, 100% cyber security is unachievable; breaches are inevitable, where modern threats demand a shift from reactive defense to proactive resilience. Resilience requires mindset and culture change, not just new technology, while focus can sustain operations and limit damage when security fails.

Assembling the resiliency strategic pillars and actions:

  • Risk Assessment: continuous evaluation of assets and vulnerabilities
  • Incident Response: develop, test, and update comprehensive crisis plans
  • Employee Training: ongoing education to make staff the first line of defense
  • Systems Testing: regular audits, penetration tests, and vulnerability scans
  • Partnerships: collaborate with industry experts for knowledge sharing
  • Culture: embed resiliency throughout the organization at every level

BJ Deonarain is a globally focused cybersecurity executive responsible for driving cyber security and cyber resiliency strategy at Hitachi Vantara. With a career spanning technical innovation, client solutions, and cross-functional leadership, BJ combines deep technical expertise with a client-centric approach to mitigate risk and elevate organizational security postures.

Topics: Information Security, Strategic Management
11:00 - 11:50 AM

[1 CPE] New Era of Deception: AI, Deep Fakes, and the Dark Web

  Presented by Morgan Trust, Associate Penetration Tester • FRSecure

Explore how artificial intelligence is fueling a new wave of cyber deception through deep fakes, social engineering, and dark web activity. In this session, Morgan Trust, Associate Penetration Tester at FRSecure, will uncover real-world examples and emerging threats while offering strategies to spot and defend against them. Gain the knowledge you need to navigate this evolving landscape with confidence.

As an Associate Penetration Tester at FRSecure, Morgan brings five years of experience and holds both the eLearnSecurity Junior Penetration Tester and CompTIA Security+ SY0-601 certifications to the table. Morgan is an extremely valuable asset to the team who works directly on the front lines with FRSecure’s clients. In his free time, Morgan enjoys Capture the Flag competitions, weightlifting, cooking/baking, dancing, listening to music at max volume, hiking, thrifting, and spending time with family.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Beyond the Checkbox: Building Security Beyond Compliance Frameworks

  Presented by Matthew Ziegler, Director of Advisory and Success, MBA, CISSP, CISA  • Novacoast

Too often, organizations see governance and compliance as a means to an end: passing an audit, gaining a certification, or filing a report. Really, these are just the start of the Information Security journey. In this session, we’ll explore how leaders can move beyond “checkbox compliance” by aligning governance with real-world risk, embedding security into culture, and using frameworks like PCI DSS, ISO 27001, NIST CSF 2.0, and CMMC as foundations for continuous improvement rather than static achievements. Drawing from real-world experience leading global SOCs, audits, and board-level risk programs, I’ll share strategies for changing direction from compliance-driven to resilience-focused, and how to communicate these strategies to executives, regulators, and staff.

Topics: Governance, Risk, and Compliance, Information Security
2:00 - 2:50 PM

[1 CPE] Change Leadership Propelling You and Your Business

  Presented by Bradley Pristelski, Central Region CIO, CommonSpirit Health

Propelling change forward in any organization is a difficult leadership challenge. People naturally resist change and view it uncomfortable, difficult work, and time-consuming. The best leaders co-create change amongst their teams and throughout the organization before the problem or opportunity first materializes which creates a high sense of ownership that can’t be overstated. As the saying goes, “Don’t involve me in the landing if you don’t involve me in the takeoff.”

Topics: Culture, Strategic Management
Derek KruseDerek KruseChief Information Officer, Douglas Omaha Technology Commission
3:00 - 3:50 PM

[1 CPE] Exponential Mindfulness: Harness the Power You Already Have!

  Presented by Derek Kruse • Chief Information Officer, Douglas Omaha Technology Commission

Mindfulness is for everyone—yes, even you! Exponential Mindfulness delivers practical tools to finally make mindfulness accessible and useful across all aspects of your personal and professional life. This presentation will introduce you to a universal and easy to implement mindfulness management framework. Now is the time to break through difficult challenges, capitalize on mindful momentum, and build resiliency for compounding improvement.

Derek Kruse has over 25 years of organizational leadership experience. He has held leadership positions in Fortune 500 companies, the nonprofit sector, government, and higher education. Derek is the Chief Information Officer for the Douglas Omaha Technology Commission (DOTComm), which serves the technology needs of the City of Omaha and Douglas County in Nebraska. He is also an Adjunct Assistant Professor at Creighton University in the fields of strategy and entrepreneurship.

He recently launched Exponential Mindfulness to help people harness the power they already have by using simple tools to overcome challenges and build resilience for compounding growth.

He holds a bachelor’s degree from Cornell University, where he played varsity basketball for four years; an MBA from Emory’s Goizueta Business School and a DBA from Creighton's Heider College of Business. He also holds a certificate in Strategy Execution for Public Leadership from Harvard and a certificate in Mindful Leadership from Spirit Rock.

Derek, his wife Dana, and their two children are native Cornhuskers and live in Bennington, NE.

Topics: Culture, Strategic Management
  • Sessions
10:00 - 10:50 AM

[1 CPE] Go Hack Yourself: War Stories from over 170,000 Pentests

  Presented by Tony Taylor, Sr Solutions Architect • Horizon3.ai

Join Tony Taylor, Senior Solutions Architect, for an engaging session on “Offense-Driven Defense.” Tony will challenge conventional risk assessment practices and unveil how focusing on real-world exploitability and impact can revolutionize your security approach. Drawing from insights gathered across more than 170,000 autonomous pentests, he’ll share compelling stories and actionable lessons that show how viewing your cyber terrain through an attacker’s lens can uncover hidden vulnerabilities, optimize resource allocation, and strengthen your defenses against advanced threats. Don’t miss this opportunity to learn from a leading industry practitioner on why it’s time to “go hack yourself” and build resilience in today’s borderless threat environment.

Topics: Information Security, Infrastructure, Strategic Management
11:00 - 11:50 AM

[1 CPE] From Chaos to Control: How Zero-Trust Networks Run Themselves

  Presented by Sukesh Garg, Vice President of Products • Nile

Many organizations still manage and secure their campus and branch networks based on a trust model designed for days past — a fragile web of switches, controllers, and security tools stitched together, never designed to secure IoT, sophisticated malware, and evolving AI threats.

The result is operational chaos, well-known vulnerabilities, and the constant feeling that something is missing. In this session, we’ll outline how leading enterprises are shifting to a Network-as-a-Service (NaaS) with completely re-designed architecture that’s built on top of modern Zero Trust Fabric — where Zero Trust security is delivered on day one. No complexity, add-ons, or legacy vulnerabilities.

With Nile, every user and device is isolated by design, micro-segmentation and granular policies provide enhanced identity-based enforcement — without the cost, complexity, and traditional risk.

Key Takeaways:

  • Traditional network security no longer meets today’s evolving security and compliance demands.
  • Zero-Trust compliance is within reach, without years of integration projects and missed timelines.
  • Reducing incidents and regaining operational control starts with a modern approach that aligns network and security requirements.
Topics: Information Security, Infrastructure
12:00 - 12:50 PM

[1 CPE] Networking Tips and Best Practices for C-Suite to Jr Admin

  Presented by Robert Phelps, Systems Engineer, Customer Engineering • Arista Networks

Modern IT networks are a living entity that requires care and feeding. If the infrastructure, tooling, and staff are neglected or taken for granted, loss of network resiliency, increased tool sprawl, and staff exodus are inevitable. Take one or more of these recommended tips in-house to make your network more resilient, easier to manage, and foster an IT working environment that will keep top talent on board for years to come.

Topics: Culture, Strategic Management, Unified Communications
1:00 - 1:50 PM

[1 CPE] Cyber Risk Associated with Quantum Computing

  Presented by BJ Deonarain, Global Alliance Cybersecurity Solutions Director • Hitachi Vantara

Quantum computers can break today's standard encryption algorithms (RSA, ECC) in minutes relative to time using Shor’s/Grover algorithm. “Harvest Now, Decrypt Later” attacks allow adversaries to steal encrypted data now and crack it when quantum computers mature. Quantum systems themselves are vulnerable to new attack vectors, quantum hacking (side-channel, noise-based), quantum malware, and manipulation of qubit stability. Supply chain attacks targeting quantum hardware, proprietary algorithms, and insider threats are rising as nation-states and cybercriminals escalate espionage efforts. Urgent need for quantum-resistant cryptography and robust quantum cybersecurity measures as quantum adoption accelerates.

BJ Deonarain is a globally focused cybersecurity executive responsible for driving cyber security and cyber resiliency strategy at Hitachi Vantara. With a career spanning technical innovation, client solutions, and cross-functional leadership, BJ combines deep technical expertise with a client-centric approach to mitigate risk and elevate organizational security postures.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Adapting Detection & Response: MDR vs SOC Partnership in Evolving Threat Environments

  Presented by James Podziomek, Solutions Engineer, Marco Technologies & Ryan LaBarre, Account Executive, Arctic Wolf

Join us for a strategic deep dive into today’s evolving cybersecurity threat landscape. We’ll explore the distinct advantages of Managed Detection and Response (MDR) versus traditional Security Operations Center (SOC) partnerships, and provide actionable insights to help organizations strengthen their defenses. This session highlights Marco’s collaboration with Arctic Wolf to deliver advanced, cost-effective security operations and incident response—tailored to dynamic risk profiles, regulatory demands, and the realities of modern IT environments.

Topics: Information Security
  • Sessions
10:00 - 10:50 AM

[1 CPE] Securing AI Without Slowing Innovation: A Blueprint for the Future of Cybersecurity

  Presented by Alex Ruff, Principal Solutions Engineer • Trend Micro

AI is transforming the enterprise—bringing new opportunities for efficiency, but also introducing unprecedented risks. From prompt injection and model poisoning to shadow AI and deepfakes, the attack surface is evolving faster than most IT teams can keep up. In this session, we’ll explore Trend Micro’s Security for AI Blueprint, a step-by-step framework for protecting data, models, infrastructure, and users in an AI-driven world. You’ll also see how Trend Micro leverages AI across its own cybersecurity platform, combining decades of research with modern generative AI to deliver proactive protection. Walk away with practical strategies you can apply to safeguard your organization’s AI initiatives—without putting innovation on hold.

Topics: Artificial Intelligence, Information Security
11:00 - 11:50 AM

[1 CPE] Cyber Threat Landscape for H1 2025: Insights from ESET Telemetry

  Presented by Matt Moss, Sr Sales Engineer • ESET

Explore the key cybersecurity trends shaping H1 2025 in North America. This session covers headline threats including fake error scams (ClickFix), evolving ransomware tactics, and the rise of NFC malware. Gain actionable insights to strengthen your security posture.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Securing the Future: Cyber Risk Insurance Essentials in an AI-Driven Digital Landscape

  Presented by Matt Moss, Sr Sales Engineer • ESET

As AI reshapes the digital world, cyber threats are growing in scale and complexity. This session explores the essentials of cyber risk insurance—who’s at risk, why coverage matters, and how AI is transforming both the threat landscape and defense strategies. Learn how to leverage AI for proactive protection and how to safeguard your organization.

Topics: Artificial Intelligence
2:00 - 2:50 PM

[1 CPE] Enhancing Cyber Resilience for Active Directory (and Entra ID)

  Presented by Rob Ingenthron, Sr Solution Engineer • Semperis

Cyberattackers are adept at finding ways through your defenses and into identity systems like Active Directory. Many organizations use Active Directory as the primary identity service, and Active Directory is typically tied into almost everything, including Entra ID. From there, they can move laterally, escalate privileges, access sensitive resources, and inject malware or ransomware. Implementing a layered defense that includes identity threat detection and response (ITDR) is key to protecting your operational resilience.

Join Rob Ingenthron, Sr Solution Engineer, to learn:

  • How layered defense has changed over time
  • Why ITDR is now an essential part of a robust layered defense strategy
  • The continuing importance of hygiene and auditing for Active Directory
  • How a layered defense can help you combat attacks that are designed to bypass traditional methods of defense
  • Which best practices lead to a strong layered defense
Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Dar Andrews
Chief Information Officer
NEI Global Relocation

Michael Bierman
Director, Information Technology
Midlands Choice, Inc.

Jason Boche
Sr Director, Corporate Development & Strategy
Union Pacific

Jon Brantner
Director, Information Technology
Earl May Seed & Nursery

Jody Brott
Global Head of Information Technology
Wipro Limited

Gayle Caldwell
Manager, Information Technology
Southwest Iowa Renewable Energy

Ken Duncan
Manager, Infrastructure & Operations
Blue Cross & Blue Shield of Nebraska

Mike Gritz
Sr Manager, Security Architecture
Woodman Life

Rick Haugerud
AVP, Information Technology Services
University of Nebraska

Blake Jaraczeski
Manager, Information Technology
Central Church

Matt Johnson
Sr Vice President, Information Technology, CFO
PremierBank

Rob LaMagna-Reiter
Chief information Security Officer
Woodman Life

Lisa McKee
Assistant Professor, Cybersecurity
Bellevue University

Dawn Melcher
Manager, Cybersecurity
Bank of Montreal

Jason Muessel
Chief Information Security Officer
Bank of Prague

Manoj Regmi
Vice President, Technology
Farmers Edge

Ryan Regnier
Director, Cybersecurity
Nelnet

Terrance Steinhart
Manager, Cybersecurity
Blue Cross & Blue Shield of Nebraska

Memory Trosper
Sr Director, Technology Services
Gothenburg Health

Dana Turner
Chief Information Security Officer
Union Bank and Trust

Doug Ullman
Sr Manager, Global IT Operations
Valmont Industries, Inc.

Leesa Wees
VP & Manager, IT Controls & Governance
Bank of Montreal

Justin Williams
Director, Information Security
Hudl

John Wischmeier
Vice President, Manager, Information Technology
Exchange Bank

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

ESET

ESET

ESET
For more than 30 years, ESET® has been developing industry-leading IT security software and services to protect businesses, critical infrastructure, and consumers worldwide.
Visit Website
Hitachi Vantara

Hitachi Vantara

Hitachi Vantara
Hitachi Vantara helps enterprises create and derive value from their data. Its solutions include best-in-class data management, IT infrastructure and analytics products, IoT solutions and Smart Spaces technologies for a broad range of industries.
Visit Website

SILVER SPONSORS

Arista Networks

Arista Networks

Arista Networks
Arista Networks is an industry leader in data-driven, client-to-cloud networking for large data center, campus, and routing environments. Arista’s award-winning platforms deliver availability, agility, automation, analytics, and security through an advanced network operating stack.
Visit Website
FRSecure

FRSecure

FRSecure
FRSecure applies industry standards to assess existing information security programs (administrative, physical and technical security controls), and we develop, implement and manage information security programs tailored to each client’s specific security needs.
Visit Website
Horizon3.ai

Horizon3.ai

Horizon3.ai
Horizon3.ai enables organizations to continuously assess the security posture of their enterprise across many attack surfaces.
Visit Website
Marco Technologies

Marco Technologies

Marco Technologies
As a national technology provider, Marco understands how organizations do business. It provides them with business technologies and managed services to take their business further.
Visit Website
Nile

Nile

Nile
Nile automates traditional network operations with AI and delivers industry’s first performance guarantee for enterprise networks.
Visit Website
Novacoast

Novacoast

Novacoast
Novacoast is an international cybersecurity company specializing in IT services and software development. With a 28-year history in the industry, Novacoast has built and maintains IT security solutions for some of the world’s largest private and public organizations. Our team is comprised of hundreds of specialists with backgrounds in IT advisory, development and engineering, and managed services. Together, we’re committed to identifying unique ways to improve the productivity and security posture of our customers.
Visit Website
Semperis

Semperis

Semperis
Semperis is the industry's most comprehensive Active Directory security and recovery platform, protecting hybrid AD environments from identity-based attacks.
Visit Website
Trend Micro

Trend Micro

Trend Micro
Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information.
Visit Website

BRONZE SPONSORS

BforeAI

BforeAI

BforeAI
BforeAI is a cybersecurity company specializing in proactive threat prevention. Our PreCrime™ technology autonomously predicts, blocks, and preempts malicious campaigns before they impact your business.
Visit Website
HPE

HPE

HPE
At Hewlett Packard Enterprise, we aim to be the industry’s leading provider of hybrid IT, built on the secure, next-generation, software-defined infrastructure that will run customers’ data centers today, bridge them to multi-cloud environments tomorrow, and power the emerging intelligent edge that will run campus, branch and Industrial IoT applications for decades to come. All delivered through a world class services capability.
Visit Website
Reach Security

Reach Security

Reach Security
Close the gap between security investment and outcomes. Reach is the unified platform that helps you save time, maximize your tools, and reduce complexity.
Visit Website

EXHIBITORS & ASSOCIATIONS

AFCEA Greater Omaha

AFCEA Greater Omaha

AFCEA Greater Omaha
AFCEA's vision is to be the premier information technology and communications association for professionals in international government and academia worldwide. The Greater Omaha Chapter supports this vision by providing a forum for information exchange.
Visit Website
Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
ARMA Nebraska

ARMA Nebraska

ARMA Nebraska
ARMA Nebraska is a chapter of ARMA International, a not-for-profit professional association, and the authority on governing information as a strategic asset. Our goal is to be a valuable resource for information management professionals.
Visit Website
Cribl

Cribl

Cribl
Founded with a vision of simplifying big data and log analytics at scale, Cribl is innovating the real-time data pipeline. Led by a team of experts in IT Operations and Observability, Cribl provides users a new level of visibility, intelligence, and control over their data.
Visit Website
CrowdStrike

CrowdStrike

CrowdStrike
CrowdStrike® provides cloud-delivered endpoint and workload protection. Leveraging artificial intelligence (AI), the CrowdStrike Falcon® platform protects customers against cyberattacks on endpoints and workloads on or off the network by offering visibility and protection across the enterprise.
Visit Website
Cyber Strong Nebraska

Cyber Strong Nebraska

Cyber Strong Nebraska
Our mission is to enhance the cybersecurity landscape across the state of Nebraska. We provide access to education, resources, and collaborative initiatives. By fostering a culture of cybersecurity awareness and resilience, we aim to protect our digital realm, safeguard personal and organizational data, and ensure a secure and prosperous future for all Nebraskans.
Visit Website
DirSec

DirSec

DirSec
We understand that cybersecurity is a constantly evolving landscape, and we are committed to staying on top of the latest trends and technologies to keep our customers protected. With over 20 years of experience in protecting customers from ever-expanding cybersecurity threats, we have grown to become a trusted partner for clients across the country.
Visit Website
EverSec Group

EverSec Group

EverSec Group
EverSec Group is the trusted security advisor to over 200 clients, most of them representing the world’s largest brand names. EverSec supports the Network/Infrastructure Security, Cyber, IR, InfoSec, and Security Operations Center teams across those customers, to ensure their targeted environments are kept safe.
Visit Website
GuidePoint Security

GuidePoint Security

GuidePoint Security
GuidePoint Security provides trusted cybersecurity consulting expertise, solutions, and services that help organizations make better decisions and minimize risk.
Visit Website
High Point Networks

High Point Networks

High Point Networks
High Point Networks is a leading provider of information technology solutions in both SMB and enterprise-level markets, servicing customers from coast to coast.
Visit Website
InfraGard Nebraska

InfraGard Nebraska

InfraGard Nebraska
InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector.
Visit Website
ISACA Omaha

ISACA Omaha

ISACA Omaha
Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the region.
Visit Website
Komprise

Komprise

Komprise
Komprise is the leader in unstructured data management. Analyze, tier, migrate, unlock data value. Optimize storage costs, feed AI data workflows.
Visit Website
MSPAA

MSPAA

MSPAA
The MSP Association of America (MSPAA) has been established with three primary missions, each of which follows a unique trajectory aimed at providing our clients, members, and students with a collaborative and informative pathway towards building a future for technology, business, and education.
Visit Website
Nebraska Tech Collaborative

Nebraska Tech Collaborative

Nebraska Tech Collaborative
Nebraska Tech Collaborative is a collaboration of over 100 business and community leaders in the Omaha and Lincoln area, whose focus is creating a pipeline for tech talent and making the tech ecosystem attractive to entrepreneurs and business. With programming reaching a variety of groups, from youth to post graduate, those who are looking for a career change to those returning to the region and more, the Nebraska Tech Collaborative reaches people throughout their workforce life cycle.
Visit Website
NEbraskaCERT

NEbraskaCERT

NEbraskaCERT
NEbraskaCERT provides repositories of technical information; links to and with other information sources; and assists in providing both academic courses and technical certifications in information security.
Visit Website
Omaha IT Council

Omaha IT Council

Omaha IT Council
The Omaha IT Council (OITC) group is here to provide laid-back opportunities for IT leaders in the Omaha area to network, build relationships, create partnerships, and grow.
Visit Website
PMI Heartland

PMI Heartland

PMI Heartland
PMI Heartland provides face-to-face contact with peers from various organizations and industries working in the project management field. We promote project management professionalism within local businesses, universities and professional organizations.
Visit Website
Qumulo

Qumulo

Qumulo
Qumulo, the leader in data-aware scale-out NAS, helps CIOs and storage administrators store, manage and curate enormous numbers of digital assets.
Visit Website

Interested in becoming part of our next Omaha event?

CONTACT US FOR INFO

Omaha

CHI Health Center Omaha
South Ballroom
455 N. 10th Street
Omaha, NE 68102

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.