F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

INTERFACE Portland

Thursday, March 19th, 2026 | 8:30 AM PDT

Register Learn More

INTERFACE Portland 2026

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

REGISTER TO ATTEND
EXHIBIT AT THE EVENT

AT A GLANCE

March 19th, 2026
8:30am – 4:30pm

Oregon Convention Center
Portland Ballroom
777 NE Martin Luther King, Jr. Blvd
Portland, OR 97232

Directions & Parking

Venue Accessibility

KEYNOTE: [1 CPE] SCARE to CARES: Delivering Digital Transformation without Chaos

  Presented by Saby Waraich • Chief Information Officer, Clackamas Community College

Seminar Schedule

  • Theater One
  • Theater Two
  • Theater Three
  • Theater Four
  • Roundtables
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Can Attackers Take Down Your Identity Provider?

  Presented by Sarah Cecchetti, Director of Product Management • Semperis

What would happen if an attacker came after your Active Directory, Okta, Ping, or Entra? Do you think that's going to get easier or harder for the attacker if your company is AI-enabled? Do you have the right protections to keep them out? Do you know what to do if they get in and take down everyone's ability to log in? Find out how the world's top companies are securing their identity infrastructure in the age of AI. Make sure you have plans in place to recover quickly and be the hero if the worst happens.

Topics: Business Continuity / Disaster Recovery
10:00 - 10:50 AM

[1 CPE] Intelligent Data Infrastructure: Unifying Cloud, Cyber, AI, and Enterprise

  Presented by Ray Kalmbach, Global Head of Hybrid Workloads for Partners • NetApp

Organizations are simultaneously pursuing cloud transformation, cyber resilience, data infrastructure modernization, and artificial intelligence. In every case, data is at the heart of the transformation—but most existing infrastructure was not designed for this moment.

This session introduces the concept of Intelligent Data Infrastructure (IDI)—an operating model where a unified data platform, integrated control plane, and data management services can manage any data, for any application, anywhere it’s needed—optimized, secured, and protected by intelligence. Using a Problem → Alternatives → Solution framework, we will examine common pitfalls and successful patterns across key domains: cloud services, cyber resilience and data protection, enterprise applications and databases, virtualization and containers, and AI & data lakes.

Attendees will leave with a reference model and practical checklist to evaluate their environment and define concrete next steps toward a more intelligent, resilient, and AI‑ready data infrastructure—without reference to any specific vendor or product.

Topics: Infrastructure
11:00 - 11:50 AM

[1 CPE] Bridging Zero Trust and SASE: A Unified Approach to Modern Cybersecurity

  Presented by Fortinet

This will be a panel discussion on how organizations can effectively bridge Zero Trust and SASE to create a unified, adaptive cybersecurity architecture that meets the demands of today’s hybrid workforce and threat landscape.

Key Takeaways:

  • Understand the core principles of Zero Trust and SASE, and how they complement each other.
  • Learn practical strategies for implementing a unified approach without adding complexity or disrupting operations.
  • Gain insights into real-world use cases and lessons learned from organizations successfully integrating these frameworks.

Moderator: Michael Lippman, Regional Channel Systems Engineer, Fortinet

Panelists:

  • Tanner Harrison, Senior Sales Engineer, Fortinet
  • Greg Still, Chief Executive Officer, Xiologix
  • Mark Wernet, Major Account Manager, Fortinet
Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Implementing AI: A Panel Discussion on the Steps You Need to Take Now

  Presented by INTERFACE Advisory Council

Your success as an IT professional has always depended on your ability to adapt. With the rapid expansion of AI capabilities, how are you evaluating and applying these tools today? What changes have you made to drive value—and where are you encountering obstacles?

Join this peer-led panel discussion to build a practical, prioritized “to-do list” of what you need to know. Our Advisory Council will share firsthand experiences implementing AI across a range of use cases while maintaining strong security controls. Panelists will outline concrete steps for developing an effective AI policy and offer guidance on engaging stakeholders to create organizational alignment. You will also explore the critical role of data governance and security in responsible AI adoption.

The discussion will address additional considerations, including collaboration with legal and HR teams, to help you prepare for enterprise-wide implementation. Bring your questions and leave with actionable insights you can apply immediately to implement AI with confidence.

Panelists:

  • Michael Bray, Chief Information Security Officer, The Vancouver Clinic
  • Brandon Gatke, AVP, Information Technology and Security, Portland Community College
  • Steve Hankel, Vice President, Information Technology, Johanson Transportation Service
  • Jaya Srinivasan, CISO, Director of Cybersecurity, M Financial Group
Topics: Artificial Intelligence, Strategic Management
2:00 - 2:50 PM

[1 CPE] What the Hack is Going On?

  Presented by Tim Medin, Chief Executive Officer • Red Siege

A comprehensive overview of modern cybersecurity threats and how breaches occur. We will highlight the various methods used by cybercriminals, including phishing, social engineering, and ransomware attacks, and emphasize the importance of identifying and addressing vulnerabilities before they can be exploited. There are a lot of vulnerabilities in the wild, and IT administrators and security professionals often focus on the wrong issues because they are easier to monitor or measure. By the end of the presentation, you will have gained valuable insights into the latest cybersecurity threats and how to protect against them.

Topics: Information Security
Saby WaraichSaby WaraichChief Information Officer, Clackamas Community College
3:00 - 3:50 PM

[1 CPE] SCARE to CARES: Delivering Digital Transformation without Chaos

  Presented by Saby Waraich • Chief Information Officer, Clackamas Community College

In the dynamic world of organizational leadership, the ability to navigate and lead through complex transformations is critical. Saby Waraich, a seasoned leader with extensive experience in technology and change management, offers an insightful session designed to empower leaders to evolve from a mindset of fear and control ("SCARE") to one grounded in empathy, trust, and collaboration ("CARES").

This session delves into the essential qualities and strategies required to lead successful transformations in today’s fast-paced and often unpredictable environment. Participants will explore how leaders can shift their approach from being overly cautious and risk-averse to fostering a culture of care, where team members feel supported, valued, and motivated to contribute their best.

Recognized by Thinkers360 as a Global Thought Leader and Influencer in the Top 10 for Project Management and Business Strategy, and in the Top 50 for Leadership, Saby Waraich is not just a speaker—he's a practitioner in the trenches every single day. Delivering keynotes and workshops that are as inspiring as they are practical, Saby marries actionable insights with a captivating storytelling style. His mission is not just to inspire but to equip you with the strategies needed to excel personally and professionally.

A veteran in driving change and fostering innovation, Saby offers a unique perspective backed by real-world experience. Whether on stage or virtually, his energetic and engaging approach provides the tools you need to stand out as a leader, build trust, and ultimately drive better results. Don't just listen to a speech; gain a professional edge from someone who's living it.

Topics: Culture, Strategic Management
  • Sessions
9:00 - 9:50 AM

[1 CPE] Driving Successful AI Adoption in 2026

  Presented by Hunter Helfgott, Data & AI Consultant & Abram Erickson, Data & AI Solutions Architect • Cerium Networks

In this session, we’ll cover the critical steps organizations can take to adopt AI successfully this year, including proven strategies, common pitfalls, and practical frameworks to move from experimentation to enterprise-wide implementation. You’ll leave with actionable guidance to align AI initiatives with business goals, build organizational buy-in, and measure ROI in a way that lasts.

AI adoption is about making AI deliver real business outcomes without creating unnecessary risk, rework, or frustration.

What We’ll Cover

  • The state of AI adoption in 2026: key trends and challenges teams are facing
  • Lessons learned in 2025: what worked, what did not, and what to do differently this year
  • A practical framework for successful AI adoption: from strategy to execution
  • Measuring success: KPIs, governance, and how to prove value over time
Topics: Artificial Intelligence
10:00 - 10:50 AM

[1 CPE] Data Resilience in the Age of Attack: Protect What Matters

  Presented by Landra Pierce, Product Strategy Technologist • Veeam

Cyberattacks are no longer a distant threat; they are a reality every IT team must be prepared for. When an attack occurs, your data becomes both the primary target and the key to recovery. Many organizations still rely on backup strategies that are designed for hardware failures or accidental deletions, rather than today’s threats, like ransomware, insider risk, and automated attacks. This disconnect creates vulnerabilities, especially when backups become an overlooked entry point in your security strategy. In this session, we will address these challenges to help you better protect your organization.

This session is ideal for IT professionals who want greater confidence in safeguarding their data and peace of mind. We will examine the most common oversights that leave organizations, including those in government, education, healthcare, and other sectors, exposed to cyberthreats. You’ll discover how teams are advancing beyond basic backup to adopt a cyber-ready approach, including topics like immutability, threat awareness, rapid recovery, and intelligent automation.

Our focus will be practical and grounded in real-world scenarios, and what truly works when pressure is high and time is limited. Because when every minute counts and trust is at stake, data resilience means more than surviving an attack. It’s about protecting what matters most and emerging even stronger.

Topics: Business Continuity / Disaster Recovery, Data Management, Information Security
11:00 - 11:50 AM

[1 CPE] The Great VM Escape: Live Migration Demo from VMware to AHV

  Presented by Nutanix

Join us for a live, end-to-end demonstration of migrating virtual machines from VMware to Nutanix AHV—no fluff, just real results. We’ll showcase the power of Nutanix Move to seamlessly convert and migrate VMs from Microsoft Hyper-V, ESXi, and even cloud environments to AHV with minimal disruption. If you're evaluating modernization strategies or planning a hypervisor transition, this session delivers practical insights you can apply immediately.

Topics: Infrastructure
1:00 - 1:50 PM

[1 CPE] Beyond Backups: Building a Cloud Disaster Recovery Strategy that Works

  Presented by Seth Eliot, Principal Resilience Architect • Arpio

You've backed up your data. You've secured your application code and infrastructure as code. You've documented runbooks. But when Google accidentally deleted a customer's entire cloud environment for a week, or when Change Healthcare's partners refused connectivity for 90 days after a breach, backups alone weren't enough. The real objective is to recover quickly and completely—data, infrastructure, networking, configuration, and security principles—all together.

In this talk, you'll learn the requirements for fast, reliable recovery, including cross-region and cross-account isolation, complete workload recovery, and testability. We'll walk through the design decisions you need to make and how you can implement them using cloud native tools. All while applying best practices to reduce toil and test your DR strategy safely and frequently.

Topics: Business Continuity / Disaster Recovery
2:00 - 2:50 PM

[1 CPE] Inside the 2026 Threat Detection Report: A First Look at this Year’s Report

  Presented by Red Canary

Join us for a deep dive into our 2026 Threat Detection Report. We’ll reveal how identity threats have skyrocketed to account for more than half of all detected threats. We will discuss how adversaries are weaponizing the "human element" through "paste-and-run" tactics and discover why the browser has become the ultimate frontline for both defenders and attackers alike. You’ll leave with better knowledge of the top threats and techniques, along with our recommendations on how to handle them.

Topics: Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] Transforming the Enterprise WAN: A Practical Path to SD-WAN and SASE

  Presented by John Spiegel, Security CTO and HPE Distinguished Technologist • HPE Networking

In today’s cloud-first, hybrid work environment, traditional WAN architectures often struggle with performance bottlenecks, rising costs, security gaps, and operational complexity. This session examines how modern SD-WAN solutions can provide a secure, business-driven foundation for enterprise connectivity while enabling a strategic transition to a unified Secure Access Service Edge (SASE) architecture. Attendees will gain insight into architectural considerations, security integration, performance optimization, and practical steps for evolving the WAN to support distributed users, applications, and cloud environments.

Topics: Infrastructure
10:00 - 10:50 AM

[1 CPE] Cybersecurity and Compliance For 2026

  Presented by Structured

This session examines how organizations can align cybersecurity, privacy, and compliance programs with the realities of 2026. The presentation reviews current threat trends, executive accountability requirements, and the expanding impact of artificial intelligence on risk management. It then connects federal, state, and industry obligations, including NIST CSF 2.0, HIPAA, CJIS, PCI DSS 4.0, CMMC, and emerging privacy laws to practical security program design. Attendees will leave with a clear framework for building a complete security program that integrates governance, segmentation, risk management, Zero Trust principles, and penetration testing to reduce risk and support regulatory readiness.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] The Speed of Trust: Why Your AI Strategy is Only as Fast as Your Security Architecture

  Presented by Chris Staley, SASE Specialist • Palo Alto Networks

In the race for AI dominance, many businesses are hitting the brakes because their security can't keep up. They’re stuck in the "Fragmentation Tax"—managing 60+ tools that don't talk to each other while trying to govern a world of prompt injections and "Shadow AI." Chris Staley, SASE Specialist at Palo Alto, will present on how organizations need to think about these challenges. Many organizations are caught between the need to reduce tool sprawl and contending with the hidden costs of adopting incomplete platforms.

Topics: Artificial Intelligence
1:00 - 1:50 PM

[1 CPE] From Liability to Asset: Securing Unstructured Data at Scale in the Era of AI

  Presented by Rubrik

Unstructured data is the lifeblood of the modern organization, yet its sheer volume often outpaces the strategies meant to protect it. As this data becomes the fuel for future AI initiatives and business intelligence, the "old way" of managing NAS has become a primary point of failure.

In this session, we’ll dive into how Rubrik NAS Cloud Direct (NCD) redefines the protection of PB-scale file systems. We will explore a modern architectural approach that provides the speed, visibility, and cloud-native flexibility required to turn massive data sets into resilient assets. Whether you are preparing for an AI-driven future or simply struggling with the growth of your current footprint, this session will provide a blueprint for total unstructured data control.

Topics: Artificial Intelligence, Data Management
2:00 - 2:50 PM

[1 CPE] The Enterprise Buyer’s Guide to AI Security Platforms

  Presented by Cato Networks

AI adoption is accelerating faster than security and governance, exposing organizations as sensitive data flows through copilots, LLM-powered apps, and agentic systems that legacy tools can’t properly protect. With a surge of AI security vendors entering the market, buying the right platform can be confusing. This presentation helps security leaders evaluate AI security solutions by clarifying the new risks AI creates, explaining the core pillars of AI security, and outlining how to compare platforms, ask the right questions, and avoid common buying mistakes.

Topics: Artificial Intelligence
  • Sessions
9:00 - 9:50 AM

[1 CPE] From Endless Alerts to Continuous Action: Why CISOs Are Shifting to CTEM

  Presented by George Tang, Solution Engineer • Zafran Security

First introduced by Gartner in 2022, Continuous Threat Exposure Management (CTEM) has quickly moved beyond buzzword status to become a cornerstone of modern cybersecurity programs. Beyond traditional vulnerability management programs, CTEM focuses on continuously identifying, validating, and prioritizing exposures so security teams can act with precision.

But the stakes are rising. Adversaries are weaponizing AI to discover and exploit vulnerabilities faster than ever, leaving organizations little margin for error. For CISOs, the challenge isn’t just finding exposures—it’s keeping pace with an accelerating threat landscape while making smarter use of existing resources.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Applied AI for Business: Turning Hype into Measurable Impact

  Presented by Greg Hatch, Sr Vice President, Strategic Growth • Gage Technologies

Despite widespread AI adoption in 2025–2026, only a small percentage of organizations are realizing significant business impact. This session cuts through the hype to clarify what AI truly is, explore the rise of generative and agentic AI, and highlight where real value is emerging—particularly in customer experience (CX) and security. Drawing on recent industry research and practical experience, we examine why many initiatives stall and what differentiates successful ones.

Participants will leave with a practical roadmap for AI success: aligning initiatives to clear business outcomes, assessing readiness, managing risks, and embedding security and governance from the start. The message is simple—AI transformation is less about the technology itself and more about strategy, data, leadership, and disciplined execution.

Topics: Artificial Intelligence
11:00 - 11:50 AM

[1 CPE] Protect Against Organized Attackers with Verified Trust for the Extended Workforce

  Presented by Fernando Barcelo, Sr Sales Engineer • Ping Identity

Organized attacker groups aren’t just hammering your perimeter anymore—they’re impersonating your employees, contractors, and partners across hiring, access, and the helpdesk. AI-powered deepfakes, credential-stuffing, MFA fatigue, and social engineering are turning the extended workforce into the easiest path into critical systems. In this session, we will show how to move from implicit trust to Verified Trust: a continuous, identity-centric security model that binds every digital interaction back to a real, verified human—without slowing them down. You’ll see practical patterns for adding high-assurance verification and adaptive controls on top of your existing IdPs and infrastructure to stop organized attackers before they can establish a foothold.

Key Takeaways:

  • Understand how AI-driven impersonation and organized attacker groups exploit gaps across hiring, workforce access, and helpdesk workflows.
  • Learn how Continuous Verification, Verified Onboarding, Verified Access, and Verified Helpdesk reduce risk across your extended workforce without adding friction.
  • See how to layer verification, credentials, and orchestration capabilities on top of your existing identity and security stack to strengthen Zero Trust initiatives.
Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Observations from the Front Lines: The People Behind the Threats and Trends

  Presented by Peter Ingebrigtsen, Sr Technical Marketing Manager • Arctic Wolf

Cybersecurity threats don’t emerge in isolation—they are observed, analyzed, and stopped by real people working on the front lines every day. This session pulls back the curtain on modern security operations, focusing on the human-driven research that powers effective threat detection, incident response, and adaptive security strategies.

Drawing on Arctic Wolf Labs research, SOC analyst expertise, and real-world incident data, this talk examines how today’s attacks are identified, contextualized, and disrupted in live environments. Attendees will gain insight into the patterns behind the most persistent threats, how adversaries continually adapt, and why defenders must evolve just as quickly. Rather than focusing solely on tools or alerts, this session highlights the people, processes, and intelligence that transform raw telemetry into actionable defense - illustrating how to turn frontline observations into scalable protection for organizations of all sizes.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Securing Critical Environments

  Presented by Keystrike

The details of this presentation will be available soon. Please check back for updates!

Keystrike turns identity from a login event into continuous proof of who is actually behind every action. We close the gap MFA, EDR, and PAM can’t—stopping attackers who hijack sessions or operate through compromised workstations. By verifying that each command comes from a real user at a trusted device, Keystrike ensures that the person who logged in is the one acting throughout the session, restoring trust in every authenticated interaction.

Topics: Information Security
  • Presented by the INTERFACE Advisory Council
12:00 - 12:50 PM

Advisory Council Roundtables

Join us during the lunch hour for Advisory Council Roundtables, an interactive opportunity to connect with council members and peers on a variety of timely industry topics. Move freely between tables, share your perspective, and gather practical insights you can take back to your organization. These conversations are informal, high-value, and designed to spark ideas and connection.

Topics & Discussion Leaders:

  • Security Awareness: What Methods Work to “Secure the Human” Frank Taylor, Systems Security Engineer, Corpay
  • Cybersecurity Approach for Non-Profits Rick Hamell, IT Director, Rose Villa Senior Living
  • AI Usage in Your Office, What You Need to do First Nathan Struk, IT Manager, Business Valuation Resources
  • Get More Out of Your IT Spending Bill Hopkins, IT Manager, City of Keizer
  • IT Staffing: Onboarding for Success Dan Kutch, IT Manager, Gunderson Marine & Iron

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Richard Appleyard
Chief Technology Officer
Oregon State Bar

Ed Arib
Manager, Technology
Portland Police Bureau

John Beal
Privacy Officer
St. Charles Health System

Dave Bowden
Chief Information Security Officer
Frontdoor, Inc.

Michael Bray
Chief Information Security Officer
The Vancouver Clinic

Brad Buckmaster
Manager, Information Technology
Plaid Pantries, Inc.

John Burleigh
Manager, Information Technology
PeaceHealth

Jonathan Burley
Director, IT and Security
Kell, Alterman & Runstein, LLP

Robert Clark
Information Security Officer
Daimler Truck North America

Randy Conner
Chief Information Officer
Morgan Auto Group

Farah Daher
IT Manager, System Administrator
Portland Community College

Brandon Gatke
AVP, Information Technology and Security
Portland Community College

Robert Gibson
Chief Technology Officer
Alta Planning + Design

Rick Hamell
Director, Information Technology
Rose Villa Senior Living

Steve Hankel
Vice President, Information Technology
Johanson Transportation Service

Bill Hopkins
Manager, Information Technology
City of Keizer, OR

Don Hornschuch
Director, Information Technology
ZRT Laboratory

Boris Kogan
IT Director, Cloud and Infrastructure Engineering
Columbia Sportswear

Dan Kutch
Manager, Information Technology
Gunderson Marine & Iron

Patrick Meaney
Manager, Information Technology
Mid-Willamette Valley Community Action

Vincent Mohr
Director, Information Technology
De La Salle North Catholic HS

Steve Moultrie
Director, Information Technology
BeefNW

Smart Ocholi
Chief, Technical Resources Branch
US Army Corps of Engineers, Engineering Division

Jeff Olson
Chief Technology Officer, CISO
Legacy Health

Linu Parappilly
Chief Information Officer
Clackamas County, OR

Shane Perry
Information Security and Risk Officer
OR Public Employees Retirement System

Ian Raloff
Sr Applications Systems Engineer
Moda Health

Josh Renoe
Director, Information Technology
The Management Group

Sam Rugi
Technical Program Manager
Intel

Sergey Sergeyev
Vice President, Enterprise Architecture
Camping World

Jaya Srinivasan
CISO, Director, Cybersecurity
M Financial Group

Nathan Struk
Manager, Information Technology
Business Valuation Resources

Michael Swinarski
Deputy Chief Information Security Officer
CorVel Corporation

Frank Taylor
Systems Security Engineer
Corpay, Inc.

Marie VerMeer
Director, Global Technology Operations
Columbia Sportswear

Gary Vermeulen
Manager, Information Technology
Lacamas Labs

Saby Waraich
Chief Information Officer
Clackamas Community College

John Weaver
Sr Director, Information Technology
nLIGHT Inc.

Scott White
Director, Information Technology
Bridgewell Resources LLC

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
Arpio

Arpio

Arpio
Protect your cloud applications with the automated DR platform purpose-built for AWS and Azure. Arpio orchestrates fast, comprehensive failover, so your business can recover from any outage, cyberattack, or other cloud disaster.
Visit Website
Cato Networks

Cato Networks

Cato Networks
Cato provides the world’s most robust single-vendor SASE platform, converging Cato SD-WAN and a cloud-native security service edge, Cato SSE 360, into a global cloud service. Cato SASE Cloud optimizes and secures application access for all users and locations everywhere.
Visit Website
Cerium Networks

Cerium Networks

Cerium Networks
Cerium is a recognized innovator and leading provider of a full suite of collaboration, contact center, networking, data center, and security solutions. We help medium to large businesses in the Northwest plan for and then realize the positive impact of technology on their business operations, strategies, and user experiences.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface & the power to take on the ever-increasing performance requirements of the borderless network – today and into the future.
Visit Website
Gage Technologies

Gage Technologies

Gage Technologies
Gage Technologies delivers tailored technology solutions including unified communications, cybersecurity, AI, and managed services to improve business efficiency and connectivity.
Visit Website
Keystrike

Keystrike

Keystrike
Keystrike turns identity from a login event into continuous proof of who is actually behind every action. We close the gap MFA, EDR, and PAM can’t—stopping attackers who hijack sessions or operate through compromised workstations. By verifying that each command comes from a real user at a trusted device, Keystrike ensures that the person who logged in is the one acting throughout the session, restoring trust in every authenticated interaction.
Visit Website
NetApp

NetApp

NetApp
NetApp – Our team is data driven. You have a vision for digital transformation. We help you make it all possible.
Visit Website
Nutanix

Nutanix

Nutanix
Nutanix makes IT infrastructure invisible with an enterprise cloud platform that delivers the agility and economics of the public cloud, without sacrificing the security and control of on-premises infrastructure.
Visit Website
Ping Identity

Ping Identity

Ping Identity
Ping Identity believes secure professional and personal identities underlie human progress in a connected world. We enable and protect identity, defend privacy, and secure the Internet.
Visit Website
Red Canary

Red Canary

Red Canary
The Red Canary Security Operations Platform, driven by purpose-built technology, security research, and threat intelligence, provides advanced threat detection and response across your entire IT estate to improve your security outcomes.
Visit Website
Red Siege

Red Siege

Red Siege
Red Siege is one of the most trusted information security consulting firms in the industry that concentrates on the latest threats to organizations today. Red Siege performs in-depth analysis, determine organization/business risk, and finds the vulnerabilities before the bad guys do. The Red Siege team of trained, qualified, and experienced information security experts is led by one of the most recognized names in the industry, our CEO Tim Medin.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website
Semperis

Semperis

Semperis
Semperis is the industry's most comprehensive Active Directory security and recovery platform, protecting hybrid AD environments from identity-based attacks.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website
Zafran Security

Zafran Security

Zafran Security
Zafran is an AI-native exposure management platform that eliminates the manual toil of vulnerability management by cutting through noise, revealing what is truly exploitable, and automating mitigation and remediation using the security controls teams already have.
Visit Website

BRONZE SPONSORS

CTL

CTL

CTL
For school tech leaders stretched thin, CTL is more than a vendor—we're a strategic technology partner. CTL replaces transactional vendors with a side-by-side partnership, delivering award-winning product and service solutions that streamline the entire EdTech technology lifecycle. Today, customers in more than 65 countries rely on CTL’s Chromebooks, Chromeboxes, and video collaboration tools, as well as deployment, maintenance, and IT asset disposition lifecycle services. CTL’s expertise has earned designations as a Google for Education Premier Partner, a Google Cloud Partner, and an Intel Technology Platinum Partner. In 2024, CTL was officially certified as a B Corp™ for its sustainability and social responsibility commitments. For further information on CTL solutions, visit ctl.net.
Visit Website
Delinea

Delinea

Delinea
Seamless, intelligent, centralized authorization to better secure the modern enterprise. The Delinea Platform enables you to discover all identities, assign appropriate access levels, detect irregularities, and immediately respond to identity threats in real-time.
Visit Website
DigiCert

DigiCert

DigiCert
DigiCert is the leading TLS/SSL Certificate Authority specializing in digital trust solutions through DigiCert ONE, the first platform built for mastering PKI, IoT, DNS, Document, and software trust.
Visit Website
Doppel

Doppel

Doppel
Doppel is the AI-native platform designed for social engineering defense. Doppel protects individuals and brands from AI-powered impersonation, phishing, fraud, and social engineering by dismantling attacker infrastructure and building resilience through training and simulation.
Visit Website
iT1 Source

iT1 Source

iT1 Source
Since 2003, iT1 Source has provided a wide range of IT solutions –– from big data and communications to online support and virtualization.
Visit Website
Lightedge

Lightedge

Lightedge
We combine colocation, private cloud, and public cloud platforms like AWS and Azure into a unified hybrid IT infrastructure purpose built to get the most out of every application. All backed up by expert 24/7/365 management and professional services—ensuring your environment stays compliant, protected, and optimized at all times.
Visit Website
Right! Systems

Right! Systems

Right! Systems
Right! Systems, Inc. is an IT management services company that provides business-driven, multi-vendor IT solutions in Network Infrastructure, Virtualization, Storage, Unified Communications, Telepresence, Security, Mobility and Professional Services.
Visit Website
Tech Heads

Tech Heads

Tech Heads
Tech Heads provides IT infrastructure design, procurement, managed services and managed security services, with a 25+ year track record.
Visit Website
VLCM

VLCM

VLCM
VLCM has been in business for over thirty years, and in that time, we’ve helped thousands of customers throughout the Rocky Mountain West find the proper solutions for their IT needs.
Visit Website
WiLine

WiLine

WiLine
Power your business with ultra-fast, reliable internet and tailored connectivity solutions from Wiline to keep you ahead in today’s market.
Visit Website

EXHIBITORS & ASSOCIATIONS

Arista Networks

Arista Networks

Arista Networks
Arista Networks is an industry leader in data-driven, client-to-cloud networking for large data center, campus, and routing environments. Arista’s award-winning platforms deliver availability, agility, automation, analytics, and security through an advanced network operating stack.
Visit Website
BorderLAN

BorderLAN

BorderLAN
BorderLAN provides Cyber Security defense software and solutions to thousands of organizations, specializing in 24/7 monitoring, Web Filtering, Student Safety, AV, Email Security, Backup, Firewalls, and more...
Visit Website
CDW

CDW

CDW
With full-stack expertise, CDW helps you design, orchestrate and manage technologies that drive business success.
Visit Website
CISA

CISA

CISA
CISA is the Nation’s risk advisor, working with partners to defend against today’s threats and collaborating to build more secure and resilient infrastructure for the future.
Visit Website
Commvault

Commvault

Commvault
Commvault is a worldwide leader in delivering data readiness. Commvault's backup and recovery software enables you to protect, manage, and use your data, while managing it in a consistent, compliant way.
Visit Website
CompuNet

CompuNet

CompuNet
CompuNet is a leading U.S. information technology partner, headquartered in Boise, Idaho. The firm specializes in consultation, design and implementation services specifically tailored to solve business problems. With a best-in-class engineering staff and approach, CompuNet focuses on building lasting relationships that prioritize client satisfaction over sales through every step of the journey.
Visit Website
eSentire

eSentire

eSentire
eSentire’s complete, multi-signal Managed Detection and Response services provide 24/7 cutting-edge protection to prevent cybercriminals from ever disrupting your business.
Visit Website
Exabeam

Exabeam

Exabeam
Exabeam is a leader in intelligence and automation that powers security operations for the world’s smartest companies. As a global cybersecurity innovator, Exabeam provides industry-proven, security-focused, and flexible solutions for faster, more accurate threat detection, investigation, and response (TDIR). Cutting-edge technology enhances security operations center performance, optimizing workflows and accelerating time to resolution. With consistent leadership in AI innovation and a proven track record in security information and event management (SIEM) and user behavior analytics, Exabeam empowers global security teams to combat cyberthreats, mitigate risk, and streamline operations.
Visit Website
Fatbeam

Fatbeam

Fatbeam
Connect to What’s Next Reliability. Scalability. Service. When speeds and connectivity are guaranteed, you have less to worry about and more time to focus on what will move your organization forward. Fatbeam makes this possible. We help businesses scale with lit and dark fiber options that improve network performance while eliminating connectivity issues and access.
Visit Website
Fortra

Fortra

Fortra
Fortra provides advanced offensive and defensive security solutions that deliver comprehensive protection across the cyber kill chain.
Visit Website
GitGuardian

GitGuardian

GitGuardian
GitGuardian protects the enterprises against leaked secrets and mismanaged identities. As you know, exposed secrets are exploited in more than 80% of today's breaches. We are the developer wingman at every step of the development life cycle and we enable security teams with automated vulnerability detection and remediation. We strive to develop a true collaborative Non-Human Identity security platform including Secrets Security, NHI Governance and AI Agents security.
Visit Website
Halcyon

Halcyon

Halcyon
Halcyon formed in 2021 by a team of cybersecurity industry veterans after battling the scourge of ransomware (and advanced threats) for years, at some of the largest global security vendors. Halcyon is focused on building products and solutions for mid-market and enterprise customers.
Visit Website
HCLSoftware

HCLSoftware

HCLSoftware
HCLSoftware, a division of HCL Technologies, powers the Digital+ economy by AI, automation, data analytics, and enterprise security solutions for modern businesses.
Visit Website
Hitachi Vantara

Hitachi Vantara

Hitachi Vantara
Hitachi Vantara helps enterprises create and derive value from their data. Its solutions include best-in-class data management, IT infrastructure and analytics products, IoT solutions and Smart Spaces technologies for a broad range of industries.
Visit Website
HPE

HPE

HPE
At Hewlett Packard Enterprise, we aim to be the industry’s leading provider of hybrid IT, built on the secure, next-generation, software-defined infrastructure that will run customers’ data centers today, bridge them to multi-cloud environments tomorrow, and power the emerging intelligent edge that will run campus, branch and Industrial IoT applications for decades to come. All delivered through a world class services capability.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
HPE Juniper Networking

HPE Juniper Networking

HPE Juniper Networking
Juniper Networks is now part of HPE. Together, we're building industry-leading, secure, AI-native networks – purpose-built with and for AI. As AI and networking converge, we're driving a bold transformation across enterprises, service providers, and cloud operators.
Visit Website
InfraGard Oregon

InfraGard Oregon

InfraGard Oregon
InfraGard is an essential part of the FBI's outreach efforts. Infragard allows two-way information sharing about intrusion incidents and system vulnerabilities,provides a channel for the DHS to disseminate analytical threat products to the private sector.
Visit Website
ISC2 Oregon

ISC2 Oregon

ISC2 Oregon
Our mission is to advance information security in local communities throughout Oregon by providing our members and other security professionals with the opportunity to share knowledge, grow professionally, educate others, and collaborate on projects.
Visit Website
ISSA Portland

ISSA Portland

ISSA Portland
The Information Systems Security Association is a not-for-profit organization of information security professionals. It provides educational forums and peer interaction opportunities that enhance the knowledge and professional growth of its members.
Visit Website
MSPAA

MSPAA

MSPAA
The MSP Association of America (MSPAA) has been established with three primary missions, each of which follows a unique trajectory aimed at providing our clients, members, and students with a collaborative and informative pathway towards building a future for technology, business, and education.
Visit Website
Netskope

Netskope

Netskope
Netskope, a global SASE leader, helps organizations apply zero trust principles and AI/ML innovations to protect data and defend against cyber threats. The Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Learn how Netskope helps customers be ready for anything on their SASE journey, visit netskope.com.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website
Pentera

Pentera

Pentera
Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers including their ransomware readiness, unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. In 2020, Pentera was chosen by Gartner as a Cool Vendor in the Security Operations and Threat Intelligence report.
Visit Website
PMI Portland

PMI Portland

PMI Portland
PMI Portland Chapter is the local Chapter of the Project Management Institute, the leading advocate of project management, worldwide. PMI has over 430,000 project management professional members in 193 countries around the globe.
Visit Website
PNSQC

PNSQC

PNSQC
PNSC is an all-volunteer organization dedicated to bringing Quality Best Practices to anyone and everyone interested in learning. We do this through our annual conference and other satellite events that bring people together to discuss Quality topics.
Visit Website
Ravenna

Ravenna

Ravenna
Upgrade your internal support with Ravenna's AI-Native ITSM platform. Our Slack-native solution helps innovative organizations unlock the full power of conversational intelligence beyond AI Agents and chatbots.
Visit Website
SIM Portland

SIM Portland

SIM Portland
For over 10 years the Portland Chapter of the Society for Information Management (SIM) has been the meeting place for IT executives, IT consultants, academicians, and sr business executives who play key roles in the use of IT in their organizations.
Visit Website
Sophos

Sophos

Sophos
Sophos Security's synchronized security approach enables organizations to secure their organization with a suite of products and services designed to tackle the zero-day threats of today and the future.
Visit Website
Technology Association of Oregon

Technology Association of Oregon

Technology Association of Oregon
The Technology Association of Oregon is the largest professional technology association in Oregon and SW Washington. TAO drives economic development by promoting, connecting, and advocating for companies involved in the software and technology industries.
Visit Website
Verkada

Verkada

Verkada
Verkada provides cloud-managed security solutions—video surveillance, access control, alarms, and more—designed to simplify physical security and deliver real-time insights for safer, smarter buildings.
Visit Website
WiCyS Oregon

WiCyS Oregon

WiCyS Oregon
Women in CyberSecurity is the premier organization with international reach dedicated to bringing together women in cybersecurity from academia, research and industry to share knowledge, experience, networking and mentoring.
Visit Website
Xiologix

Xiologix

Xiologix
Xiologix is a technology solution provider of business driven multi-vendor IT solutions to customers throughout the US and Canada. They offer a wide variety of hardware and software products from the world's leading IT companies.
Visit Website
Zscaler

Zscaler

Zscaler
As a leader in Gartner’s Magic Quadrant, Zscaler enforces business policy, mitigates risk and provides twice the functionality at a fraction of the cost of current solutions, utilizing a multi-tenant, globally-deployed infrastructure.
Visit Website

Interested in becoming part of this event?

CONTACT US FOR INFO

Portland

Oregon Convention Center
Portland Ballroom
777 NE Martin Luther King, Jr. Blvd
Portland, OR 97232

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.