F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

INTERFACE Honolulu

Thursday, May 21st, 2026 | 8:30 AM HST

Register Learn More

INTERFACE Honolulu 2026

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

REGISTER TO ATTEND
EXHIBIT AT THE EVENT

AT A GLANCE

May 21st, 2026
8:30am – 4:30pm

Sheraton Waikiki
Hawaii Ballroom
2255 Kalākaua Avenue
Honolulu, HI 96815

Directions & Parking

KEYNOTE: [1 CPE] Doing Digital Transformations Better

  Presented by Brook Conner • CIS Instructor & PhD Candidate, University of Hawaii at Manoa

Seminar Schedule

  • Theater One
  • Theater Two
  • Theater Three
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] From Initial Access to Full Control: Live Hacking, Remote Shells, and Command & Control

  Presented by Wayne Johnson, Chief Executive Officer • Stellar

Step into the attacker’s perspective in this live, unscripted demonstration of real-world hacking techniques. We’ll walk through every phase of a modern intrusion: crafting initial payloads to gain foothold, establishing resilient remote shells, and building robust command and control (C2) channels that blend into normal network traffic.

This session will showcase:

  • Methods for delivering and executing payloads without triggering defenses.
  • Techniques for spawning and managing reverse shells on Windows and Linux.
  • Approaches to encrypting and obfuscating C2 communications.
  • Tips for evading detection and maintaining persistence.

Whether you’re defending enterprise environments or learning to think like an adversary, you’ll leave with practical insights into how attackers operate—and how you can detect and disrupt them. Live Q&A will follow, so bring your questions and curiosity.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Presentation Details Soon

  Presented by Check Point Software

The details of this presentation will be available soon. Please check back for updates!

Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.

11:00 - 11:50 AM

[1 CPE] Bridging Zero Trust and SASE: A Unified Approach to Modern Cybersecurity

  Presented by Fortinet

This will be a panel discussion on how organizations can effectively bridge Zero Trust and SASE to create a unified, adaptive cybersecurity architecture that meets the demands of today’s hybrid workforce and threat landscape.

Key Takeaways:

  • Understand the core principles of Zero Trust and SASE, and how they complement each other.
  • Learn practical strategies for implementing a unified approach without adding complexity or disrupting operations.
  • Gain insights into real-world use cases and lessons learned from organizations successfully integrating these frameworks.
Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Speaking the Language of Risk

  Presented by Tom Ruoff, Principal Consultant • ImageSource

Organizations face rapidly evolving cyber threats, yet many still view technology as a cost center rather than a strategic partner. This presentation reframes the conversation by translating technical risks into business and financial terms leaders understand. Attendees will learn how to identify Business Essential Functions (BEFs), quantify operational and financial impacts, and apply practical risk‑estimation methods. By establishing a common language of risk, leaders can align priorities, invest where it matters most, and meaningfully reduce enterprise exposure. The session equips both executives and IT teams with tools to build consensus and drive smarter, outcome‑based cybersecurity decisions.

Tom Ruoff serves as Principal Consultant for ImageSource, Inc. providing cybersecurity consulting services (risk assessments, threat hunting, pen testing, breach remediation, security architectures, policies, business impact assessment) to commercial clients including Native American Tribes and Tribal Casinos, he is also a founder and current CEO of Zorse Cyber. Tom retired from the Dept of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA) in June 2023, as Chief, Methodology Branch, supervising vulnerability assessments for elections, power generation/distribution, and pipelines, and Federal Government IT systems. Before DHS, Tom was the Director of Systems Division at Northrop Grumman, developing cross domain solutions (CDS) for National Security Agency (NSA) and Central Intelligence Agency (CIA). Air Force veteran with tours at NSA, CIA element of the National Geospatial-Intelligence Agency, and Defense Intelligence Agency He is a Level III Federally Certified Program Manager, PMP, CISSP, CMMI Associate, MS/BS degrees in physics and electrical engineering.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Presentation Details Soon

  Presented by FBI

The details of this presentation will be available soon. Please check back for updates!

Brook ConnerBrook ConnerCIS Lecturer & PhD Candidate, University of Hawaii at Manoa
3:00 - 3:50 PM

[1 CPE] Doing Digital Transformations Better

  Presented by Brook Conner • CIS Instructor & PhD Candidate, University of Hawaii at Manoa

Every organization is trying to improve itself with new technology. Today, that technology is artificial intelligence. But it isn’t working nearly as well as it is supposed to. The problem isn’t the technology, or the hype around it. The problem is that large organizations undergoing change are complicated. There is no magic wand, no silver bullet, no hammer for the nail, that will work for everyone, not even AI. You need to describe what’s going on, past, present, and future. This description needs to include the technology, but also the people, the processes, the information, the world around you, everything. By incorporating diverse fields, including enterprise architecture, organizational behavior, programming language theory, semiotics, psychology, and more, even the most baroque organizations can be described, and their roadblocks and opportunities be revealed. See how, with examples both from past successes and from current trends.

Currently earning his PhD from the University of Hawaii, Conner is an experienced cross-industry CIO. He serves as a faculty instructor at the University of Hawaii at Manoa. His dissertation is tentatively titled “A system architecture approach to digital transformations.” It builds on both work experience and prior research and publications. Prior research included some of the earliest and formative papers on interactive 3D graphics, the relationship of programming language mechanisms to interactive systems, 3D user interface design, and a redesign of the undergraduate computer science curriculum.

Previous work includes five years at the Chief Information Officer (CIO) for the Hawaiʻi State Department of Education, where his team replaced the Department’s core accounting system, modernized collaboration for all staff and students, and managed the educational technology needed to support distance learning during the COVID pandemic. Prior to that, Conner was the Chief Information Security Officer (CISO) for Estee Lauder Companies, a Fortune 500 global retailer and manufacturer. He built the vulnerability management program for Morgan Stanley in response to a nation-state cyberattack, and re-architected core parts of the Bloomberg Terminal Service. Conner has an AB in art, an ScB in Math/Computer Science, and an MSc in Computer Science, all from Brown University. He is conversational in French and Hawaiian and enjoy stand-up paddling, role-playing games, video games, and wargaming.

Topics: Artficial Intelligence, Infrastructure
  • Sessions
9:00 - 9:50 AM

[1 CPE] The Foundation of Strong Security

  Presented by Nick McGillivray, Sr Sales Engineer  • Axonius

Tired of compliance that doesn't translate into actual risk reduction? This session brings CIS Controls 1 & 2 to life with practical, actionable steps that strengthen your security foundation.

Learn how to improve asset visibility, enforce configuration discipline, and drive measurable security outcomes beyond simply checking compliance boxes. Today’s environments change faster than traditional tools can track —new servers, SaaS apps, AI software, IoT/OT, and NHIs constantly appear, creating blind spots where risk hides.

We’ll cover how to aggregate and correlate data from all your security and IT tools to deliver a single source of truth for your entire attack surface. The result: complete asset intelligence, clear ownership, and the ability to proactively remediate & spot exposures before they become incidents.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Why Layered Identity Defense Is the Best Offense

  Presented by Sean Deuby, Principal Technologist, Americas • Semperis

Cyberattackers are adept at finding ways through your defenses and into identity systems like Active Directory, Entra ID, and Okta, and endpoint defenses won't stop them. From there, they can move laterally, escalate privileges, access sensitive data and resources, and inject malware or ransomware. Implementing a layered defense that includes identity threat detection and response (ITDR) and robust identity recovery is key to true cyber resilience.

Join Sean Deuby, Principal Technologist, Semperis, to learn:

  • How layered defense has changed over time
  • Why ITDR and identity recovery are essential to a robust layered defense strategy
  • How a layered defense can help you combat attacks that are designed to bypass traditional attack-detection methods
  • Which best practices lead to identity—and cyber—resilience
Topics: Business Continuity / Disaster Recovery
11:00 - 11:50 AM

[1 CPE] Latest Data Breaches, Quantum Computing, External Key Management in the Cloud

  Presented by Steven Gautier, Principal Solutions Architect • Thales

Welcome to our session on modern data threats and protection strategies. As cyber risks evolve, securing sensitive information is more critical than ever. We'll explore how encryption and key management can help protect your most valuable assets, especially in cloud environments.

We'll highlight the benefits of external key management, offering greater control and compliance. Additionally, we'll touch on the growing impact of quantum computing—and why it's vital to start preparing now.

Join us to discover the latest advancements in data security and learn how to stay ahead of emerging threats.

Topics: Artificial Intelligence, Information Security
12:00 - 12:50 PM

[1 CPE] Securing Our Mission: A Non-Profit’s Journey to Zero Trust

  Presented by Troy Villar, Director, Information Technology, Child & Family Service • The Advisory Council

This presentation offers a non-technical, firsthand account of a nonprofit’s journey to a Zero Trust security model on a limited budget. It covers core Zero Trust principles and how they were applied in practice, while addressing key challenges such as HIPAA compliance, budget constraints, and COVID-19 disruptions. The 2020–2026 roadmap highlights major milestones, including achieving a fully cloud-based environment, network redesign and segmentation, and the implementation of NAC and Unified Access Control. It also shares lessons learned, emphasizing stakeholder engagement, effective communication, and maintaining team well-being throughout the transformation.

Troy Villar has served as Director of IT at Child & Family Service since 2020, supporting Hawaii’s oldest nonprofit dedicated to strengthening families. A CISSP with over 30 years of experience, he has led software development, hardware design, and enterprise network implementations, including the design and development of a full-scale POS system for a major Hawaii retail chain. He is Vice President of ISC2 Hawaii and leads the Cybergenerations program, advancing cybersecurity education and awareness. Troy holds a degree in Information Systems from Hawaii Pacific University, where he previously served as Associate Director of Data Services, and is currently completing his Master’s in Cybersecurity and Information Assurance at WGU. Outside of work, he enjoys mountain biking, hiking, and spending time with his family and their dogs.

Topics: Infrastructure, Strategic Management
1:00 - 1:50 PM

[1 CPE] Presentation Details Soon

  Presented by Check Point Software

The details of this presentation will be available soon. Please check back for updates!

Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.

2:00 - 2:50 PM

[1 CPE] Ransomware Resilience: Navigating Threats in a Hybrid-Cloud World

  Presented by Ken Smallwood, Systems Engineer, Data Services and Storage • HPE

This presentation explores how organizations are navigating rising cyber threats, evolving workloads, and stricter regulations while managing legacy environments. We will discuss the growing risk of ransomware, fragmented data across cloud and edge, and the need for unified, resilient data protection strategies.

Topics: Business Continuity / Disaster Recovery
  • Sessions
9:00 - 9:50 AM

[1 CPE] Presentation Details Soon

  Presented by Abnormal

The details of this presentation will be available soon. Please check back for updates!

10:00 - 10:50 AM

[1 CPE] Proving Cyber Resilience: Measuring Outcomes, Not Effort

  Presented by Tony Taylor, Sales Engineer • Horizon3.ai

Most security programs measure effort — not outcomes. Organizations patch thousands of vulnerabilities, deploy dozens of tools, and run annual tabletop exercises… but when an attacker shows up, none of that matters.

What matters is whether they can prove their defenses actually work.

In this talk, Horizon3.ai shares how leading organizations are using autonomous pentesting to see their environment through the attacker’s eyes — continuously, safely, and at scale. By shifting from assumptions to proof, they’ve learned to:

  • Prioritize what’s exploitable. Focus limited resources on the weaknesses that truly put the business at risk that are known to be abused by threat actors.
  • Quickly fix what matters. Close the loop from find → fix → verify and reduce your exploitable attack surface.
  • Reduce attacker dwell time. Use pentest results to precisely deploy honeyTokens to detect compromise early, and to continuously prove your EDR and SIEM are tuned and working as intended.

Cyber resilience isn’t about being perfect — it’s about getting better over time. And the only perspective that truly matters is the attacker’s.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Data Resilience in the Age of Attack: Protect What Matters

  Presented by Landra Pierce, Product Strategy Technologist • Veeam

Cyberattacks are no longer a distant threat; they are a reality every IT team must be prepared for. When an attack occurs, your data becomes both the primary target and the key to recovery. Many organizations still rely on backup strategies that are designed for hardware failures or accidental deletions, rather than today’s threats, like ransomware, insider risk, and automated attacks. This disconnect creates vulnerabilities, especially when backups become an overlooked entry point in your security strategy. In this session, we will address these challenges to help you better protect your organization.

This session is ideal for IT professionals who want greater confidence in safeguarding their data and peace of mind. We will examine the most common oversights that leave organizations, including those in government, education, healthcare, and other sectors, exposed to cyberthreats. You’ll discover how teams are advancing beyond basic backup to adopt a cyber-ready approach, including topics like immutability, threat awareness, rapid recovery, and intelligent automation.

Our focus will be practical and grounded in real-world scenarios, and what truly works when pressure is high and time is limited. Because when every minute counts and trust is at stake, data resilience means more than surviving an attack. It’s about protecting what matters most and emerging even stronger.

Topics: Business Continuity / Disaster Recovery, Data Management, Information Security
1:00 - 1:50 PM

[1 CPE] From Liability to Asset: Securing Unstructured Data at Scale in the Era of AI

  Presented by Rubrik

Unstructured data is the lifeblood of the modern organization, yet its sheer volume often outpaces the strategies meant to protect it. As this data becomes the fuel for future AI initiatives and business intelligence, the "old way" of managing NAS has become a primary point of failure.

In this session, we’ll dive into how Rubrik NAS Cloud Direct (NCD) redefines the protection of PB-scale file systems. We will explore a modern architectural approach that provides the speed, visibility, and cloud-native flexibility required to turn massive data sets into resilient assets. Whether you are preparing for an AI-driven future or simply struggling with the growth of your current footprint, this session will provide a blueprint for total unstructured data control.

Topics: Artificial Intelligence, Data Management
2:00 - 2:50 PM

[1 CPE] Observations from the Front Lines: The People Behind the Threats and Trends

  Presented by Peter Ingebrigtsen, Sr Technical Marketing Manager • Arctic Wolf

Cybersecurity threats don’t emerge in isolation—they are observed, analyzed, and stopped by real people working on the front lines every day. This session pulls back the curtain on modern security operations, focusing on the human-driven research that powers effective threat detection, incident response, and adaptive security strategies.

Drawing on Arctic Wolf Labs research, SOC analyst expertise, and real-world incident data, this talk examines how today’s attacks are identified, contextualized, and disrupted in live environments. Attendees will gain insight into the patterns behind the most persistent threats, how adversaries continually adapt, and why defenders must evolve just as quickly. Rather than focusing solely on tools or alerts, this session highlights the people, processes, and intelligence that transform raw telemetry into actionable defense - illustrating how to turn frontline observations into scalable protection for organizations of all sizes.

Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Michael Agtunong
Vice President, Information Systems
Gather Federal Credit Union

Sylvester Apiki
Director, Information Technology
Molokai Ohana Health Care

Brad Bishop
Manager, Information Technology
Alaka’i Mechanical

Joe Braceros
Director, Information Technology
Waikiki Health

Nate Chang
Director, Client Services
Punahou School

Benson Choo
Chief Information Officer
Finance Factors, Ltd.

Cody Down
Chief Information Officer, Vice President
Hawaii Pacific University

Tammy Earle
Manager, Information Technology
YMCA of Honolulu

Randy Faatau
VP, Cybersecurity Architecture & Operations
First Hawaiian Bank

Ryan Field
Executive Vice President, IT, CISO
Bank of Hawaii

Vince Hoang
Chief Information Security Officer
State of Hawaii

Jodi Ito
Chief Information Security Officer
University of Hawaii

Kyle Izumigawa
Director, IT Operations
Hawaiian Telcom

Addie Lui
Director, Information Security
Aloha Pacific Federal Credit Union

Scott Mellon
Manager, IT End User Services & Support
The Queen’s Health Systems

Geoff Milford
Cybersecurity Engineer
Hawaii Pacific Health

Tim Minick
Sr Dept Manager, Information Security
Hawaii State Federal Credit Union

Beau Monday
Chief Information Security Officer
Punahou School

Grant Nakamichi
Manager, IT Infrastructure
Aloha Pacific Federal Credit Union

Henderson Nuuhiwa
Chief Information Officer
Honolulu Board of Water Supply

Nathan Plain
Director, Information Technology
KYA Inc.

Jeff Reyes
Vice President, Technology Risk & Governance
Bank of Hawaii

Chris Robinson
Vice President, Cybersecurity Director
Finance Factors Ltd

Cassie Stelow
Director, Information Technology
Pacific Disaster Center

Tony Velasco
IT Division Chief
City & County of Honolulu

Dwight Victor
Systems & Network Team Lead
General Dynamics Mission Systems

Troy Villar
Director, Information Technology
Child & Family Service

Charissa Wong
Manager, Information Technology
Bowers + Kubota Consulting

Kenrick Wong
Manager, IT Operations
Honolulu Board of Water Supply

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website

SILVER SPONSORS

Abnormal

Abnormal

Abnormal
The Abnormal Behavior Platform uses superhuman understanding of human behavior to protect against phishing, social engineering, and account takeovers.
Visit Website
Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
Axonius

Axonius

Axonius
Axonius is an asset inventory management platform that focuses on cybersecurity solutions and policies.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet helps organizations across the public and private sectors protect the systems, data, and services that keep businesses and communities running. From government agencies and schools to enterprises and service providers, leaders rely on Fortinet to secure critical infrastructure, ensure operational continuity, and defend against evolving cyber threats. Our Security Fabric platform unifies networking and security to deliver the visibility, control, and efficiency organizations need to operate confidently, whether virtual, in the cloud, or on-premises.
Visit Website
Horizon3.ai

Horizon3.ai

Horizon3.ai
Horizon3.ai enables organizations to continuously assess the security posture of their enterprise across many attack surfaces.
Visit Website
HPE

HPE

HPE
At Hewlett Packard Enterprise, we aim to be the industry’s leading provider of hybrid IT, built on the secure, next-generation, software-defined infrastructure that will run customers’ data centers today, bridge them to multi-cloud environments tomorrow, and power the emerging intelligent edge that will run campus, branch and Industrial IoT applications for decades to come. All delivered through a world class services capability.
Visit Website
ImageSource

ImageSource

ImageSource
ImageSource is a software and systems integration firm specializing in Enterprise Content Management.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website
Semperis

Semperis

Semperis
Semperis is the industry's most comprehensive Active Directory security and recovery platform, protecting hybrid AD environments from identity-based attacks.
Visit Website
Stellar

Stellar

Stellar
Our mission is to make migrating to the cloud easier for enterprises than ever before. The cloud isn't just for people with massive development teams that can re-architect enterprise apps to make moving to a big-name public cloud cost-effective. At Stellar, we want to bring the power of cloud computing to everyone and help our customers worry less about IT infrastructure.
Visit Website
Thales

Thales

Thales
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website

BRONZE SPONSORS

Commvault

Commvault

Commvault
Commvault is a worldwide leader in delivering data readiness. Commvault's backup and recovery software enables you to protect, manage, and use your data, while managing it in a consistent, compliant way.
Visit Website
Delinea

Delinea

Delinea
Seamless, intelligent, centralized authorization to better secure the modern enterprise. The Delinea Platform enables you to discover all identities, assign appropriate access levels, detect irregularities, and immediately respond to identity threats in real-time.
Visit Website
ExtraHop

ExtraHop

ExtraHop
ExtraHop delivers enterprise cyber analytics that allow you to quickly investigate threats, ensure the delivery of critical applications, and secure your investment in the cloud.
Visit Website
Netskope

Netskope

Netskope
Netskope, a global SASE leader, helps organizations apply zero trust principles and AI/ML innovations to protect data and defend against cyber threats. The Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Learn how Netskope helps customers be ready for anything on their SASE journey, visit netskope.com.
Visit Website
World Wide Technology

World Wide Technology

World Wide Technology
World Wide Technology (WWT) WWT, a $20B, privately held technology solutions provider leading the AI and Digital Revolution, has over 30 years of experience helping the world's largest organizations make the right technology decisions faster. Commercial enterprise, public sector and service provider clients work with WWT from strategy to execution bolstered by hands-on access to cutting-edge capabilities across infrastructure, data and AI, security, cloud and more through the Advanced Technology Center.
Visit Website

EXHIBITORS & ASSOCIATIONS

Anzenna

Anzenna

Anzenna
We are on a mission to stop insider risk. People are one of the biggest security challenges for organizations, causing 68% of breaches. Yet, most solutions are limited to ineffective annual trainings or phishing tests. We’re here to change that!
Visit Website
ARMA Hawaii

ARMA Hawaii

ARMA Hawaii
ARMA International provides education and networking opportunities to information professionals to enable them to use skills and experience to leverage the value of records and knowledge as corporate assets and as contributors to organizational success.
Visit Website
AVCO

AVCO

AVCO
The Audio Visual Company is Hawaii’s trusted AV service provider across the entire island chain. As a locally owned and operated company with over 50 years in the audio visual business space, we thrive to provide only the best possible service that we can achieve.
Visit Website
Cohesity

Cohesity

Cohesity
Cohesity delivers a web-scale platform that simplifies data protection, consolidates file and object services, provides instant access to test/dev copies, spans from the edge to the cloud, and performs in-place searches and analytics.
Visit Website
CyberHawaii

CyberHawaii

CyberHawaii
CyberHawaii is an information sharing and analysis non-profit organization committed to developing and enhancing Hawaii’s cybersecurity capabilities. The organization is working to build a community that manages and mitigates cyber risk through various methods.
Visit Website
DRFortress

DRFortress

DRFortress
DRFortress is the largest and the only carrier-neutral data center and cloud marketplace operating in Hawaii. Experience the operational reliability, scalability, and security that DRFortress provides for all your mission-critical IT systems.
Visit Website
Exabeam

Exabeam

Exabeam
Exabeam is the leader in behavior intelligence for the agentic enterprise. As organizations deploy digital workers and confront machine-speed adversaries, Exabeam applies agent-powered analytics to understand and govern the behavior of both human and non-human insiders. With integrated Exabeam Nova cybersecurity agents, Exabeam delivers flexible, industry-proven solutions for insider threat coverage of humans and agents and faster, more accurate threat detection, investigation, and response (TDIR). As the pioneer of user and entity behavior analytics (UEBA) and the innovator behind Agent Behavior Analytics (ABA), Exabeam is trusted by more than 3,000 enterprises worldwide to reduce risk, secure the digital workforce, and accelerate security operations.
Visit Website
InfraGard Hawaii

InfraGard Hawaii

InfraGard Hawaii
InfraGard is a partnership between the FBI and the private sector. It is an association dedicated to sharing information and intelligence to prevent hostile acts against the U.S.
Visit Website
ISACA Hawaii

ISACA Hawaii

ISACA Hawaii
Aloha and welcome to the ISACA Hawaii Chapter. The aim of the Chapter is to sponsor educational seminars, workshops, conduct chapter meetings, and help promote and elevate the visibility of the IS audit, control and security profession throughout the area.
Visit Website
ISC2 Hawaii

ISC2 Hawaii

ISC2 Hawaii
The International Information Systems Security Certification Consortium, Inc., (ISC)², is the global, not-for-profit leader in educating and certifying information security professionals throughout their careers.
Visit Website
ISSA Hawaii

ISSA Hawaii

ISSA Hawaii
Welcome to ISSA's Hawaii Chapter, a group of information security professionals devoted to providing educational forums, publications and peer interaction opportunities that enhance the knowledge skills and growth of its members.
Visit Website
MSPAA

MSPAA

MSPAA
The MSP Association of America (MSPAA) has been established with three primary missions, each of which follows a unique trajectory aimed at providing our clients, members, and students with a collaborative and informative pathway towards building a future for technology, business, and education.
Visit Website
Nutanix

Nutanix

Nutanix
Nutanix makes IT infrastructure invisible with an enterprise cloud platform that delivers the agility and economics of the public cloud, without sacrificing the security and control of on-premises infrastructure.
Visit Website
PMI Hawaii

PMI Hawaii

PMI Hawaii
PMI is the world's leading not-for-profit membership association for the project management profession. PMI Honolulu's mission is to promote the project management practice and profession through networking, sharing of project experiences, training, education, and certification in the State of Hawaii.
Visit Website
Secure Technology Hawaii

Secure Technology Hawaii

Secure Technology Hawaii
Providing high performance solutions, managed services, private & cloud hosting and 365x24x7 support now for 27 years!
Visit Website
Unified Security Partners

Unified Security Partners

Unified Security Partners
Unified Security Partners is a locally owned security partner located on Oahu and serving all of the Hawaiian Islands. Our team is proud to be a top trusted Verkada authorized sales and installation partner with experience dating back to 2019.
Visit Website
Verizon

Verizon

Verizon
We create connections that advance global business opportunities and enrich lives. Despite the challenges of today’s rapidly changing environments, the right technologies can help drive growth and performance, as well as improve the customer experience.
Visit Website
Verkada

Verkada

Verkada
Verkada provides cloud-managed security solutions—video surveillance, access control, alarms, and more—designed to simplify physical security and deliver real-time insights for safer, smarter buildings.
Visit Website

Interested in becoming part of this event?

CONTACT US FOR INFO

Honolulu

Sheraton Waikiki
Hawaii Ballroom
2255 Kalākaua Avenue
Honolulu, HI 96815

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.