F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Albuquerque 2022 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Albuquerque EVENTS

AT A GLANCE

July 28th, 2022
8:30am – 4:30pm

Albuquerque Marriott Pyramid North
Pyramid Ballroom
5151 San Francisco Road NE
Albuquerque, NM 87109

Directions & Parking

KEYNOTE: [1 CPE] Should I Stay, or Should I Go?

  Presented by INTERFACE Advisory Council • Panel Discussion

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Stopping Attacks, Not Your Business: AI & Autonomous Response

  Presented by Darktrace

With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join this session to explore the benefits of Autonomous Response as a must-have that goes beyond ‘defense,’ including real-world threat finds and attack scenarios.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Active Defense: Be the Hunter, not the Prey

  Presented by AQUILA

In this session, we’ll discuss Active Defense and why it’s a critical part of any mature security program. Active Defense requires continuous monitoring, threat hunting, and incident response. We will focus specifically on internal threat hunting and monitoring of the dark web. Join to gain an understanding of what active defense is, what threat hunting is, and the wealth of intelligence that can be found on the dark web.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Navigating Today’s Threat Landscape: A Current State of Cybersecurity

  Presented by Fortinet

Join this session for a comprehensive look at the current state of cybersecurity. Today’s ever-evolving threat landscape requires an integrated, automated approach to security. Learn how you can mitigate risk in your organization, optimize your security team’s operations, and gain best practices to integrate and consolidate your security tools; whether you’ve taken a multi-vendor or single-vendor approach.

Topics: Information Security
12:00 - 12:50 PM

[1 CPE] How to Affect Tech Policy through Collective Action

  Presented by New Mexico Technology Council

When companies or individual professionals join forces for a common cause, they demonstrate the impact of collection actions. The session will explore the ability of associations, like the New Mexico Technology Council, to mobilize the exceptional talent and wide reach of their members to build a stronger New Mexico. Participants will learn how associations identify the principles and challenges their members have in common and then guide them to solutions. The session demonstrates the essential role collective action plays in improving society and maintaining a thriving tech economy.

1:00 - 1:50 PM

[1 CPE] Pure SOC Fury: The Cybersecurity Book of Bad Decisions

  Presented by Arctic Wolf

Join this presentation for insights taken from the frontlines of security operations. The session will draw on experiences and observations from real-world incidents and interesting SOC data points and trends. There are four broad bad decisions that we see being played out, time and again, across cybersecurity and from which everyone can and should learn. Arctic Wolf will show how a focus on Security Operations aligned with outcomes that matter to you will position you to start your journey toward ending your cyber risk.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Challenge the Threat of Ransomware: Best Practices to Prepare, Mitigate, and Recover

  Presented by Zerto

Ransomware attacks continue to rise in volume, severity, and costs to businesses attacked while cyber criminals continue inventing new and unexpected methods to spread malware and encrypt critical data. As attacks continue to specialize, no organization is immune to ransomware. So how do you avoid being forced to pay a ransom, disruptions to services and supply chains, and damage to your brand in the news? Join recovery and data protection experts from Zerto to discuss best practices for when – not if – ransomware strikes. Be prepared to minimize downtime, data loss, and mitigate the risks of ransomware. In this session, you’ll learn:

  • Ransomware 101: A breakdown of a ransomware attack and how it affects systems
  • Steps you can take to reduce the likelihood of attacks on your system
  • How to choose a best-in-class recovery solution for ransomware
  • How you can best harden your recovery systems against attacks
  • How to create a recovery plan to react and recover quickly
  • Real example of a company hit twice by ransomware and how they improved recovery time from weeks to minutes by planning ahead
Topics: Information Security
INTERFACE Advisory CouncilINTERFACE Advisory CouncilPanel Discussion
3:00 - 3:50 PM

[1 CPE] Should I Stay, or Should I Go?

  Presented by INTERFACE Advisory Council • Panel Discussion

Over the past year, the professional workforce has dealt with extensive turnover. In what is being labeled “The Great Resignation,” employees are vacating roles en masse, sometimes with no future employment lined up. There are many reasons why this is happening. Employees report their priorities changed following the pandemic of 2020 and the coinciding lockdown. All of this has brought challenges for Managers and Directors across industries.

In the IT industry, shops are struggling to maintain needed levels of staffing. With so many IT jobs capable of remote working, IT staffers are taking positions at out-of-market companies with higher salaries. Across the country, there are examples of employees moving to a preferred destination while working a remote job. For IT leaders in New Mexico, there is an ongoing challenge to maintain needed staffing levels and provide proper service.

Join a group of distinguished local IT leaders for an open discussion on the challenges of staffing and supporting current employees.

Panelists:

  • Jose Diaz, Director, Information Services, Gerald Champion Regional Medical Center
  • Steve Cox, Director, Information Technology, The Downs Casino and Racetrack
  • Aaron Frankel, Information Security Officer, TriCore Reference Laboratories
  • Mike Kelley, Chief Information Officer, Mesilla Valley Transportation
  • Dee Skinner, Director, IT Services, Haverland Carter LifeStyle Group
Topics: Culture, Strategic Management
  • Sessions
9:00 - 9:50 AM

[1 CPE] 2022 Threat Review

  Presented by Malwarebytes

The Malwarebytes 2022 Threat Review is an annual report on the latest threats, attack trends, and privacy breaches impacting individuals, organizations, and national security. Researchers detail threat intelligence across operating systems and examine how privacy has shifted and the ways that cybercriminals and crimes are evolving. With a stronger understanding of the threat landscape, organizations and individuals can make more informed security and cyber-protection decisions.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Disrupting the Means to Prevent the End: A Guide to Detecting Ransomware

  Presented by Red Canary

Ransomware has been a dominant cybersecurity threat for the better part of the last decade. However, it doesn’t walk alone. It’s almost always the eventual payload delivered by earlier-stage malicious software or activity. Luckily, if you can detect the threats that deliver the ransomware, you can stop the ransomware before it arrives.

In this talk, we’ll extensively reference Red Canary’s 2022 Threat Detection Report, examining the malware and other malicious tools that adversaries often use to deliver ransomware. While the specific trojans and strains of ransomware may change from one attack to the next, adversary tactics, techniques, and procedures are often similar across campaigns and threats. By developing robust detection coverage for the techniques adversaries abuse most often, rather than focusing on individual threats, security teams can achieve defense-in-depth against the many threats that leverage those techniques and the broader trends that dominate the infosec landscape.

Want to learn more about the prevalent adversary techniques and threats that can lead to a ransomware infection? Attendees will leave with:

  • A better understanding of the threats and tools that commonly precede a ransomware infection
  • Guidance on relevant collection and data sources that offer visibility into the threats and techniques that adversaries use to deliver ransomware
  • Actionable information on how security teams can develop the capacity to detect, prevent, and mitigate ransomware and other threats
  • Strategies for testing their ability to observe and detect common threats with free and easy-to-use tools like Atomic Red Team
Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Is DDoS a Crime?

  Presented by Radware

2022 has a serious “DDoS is a not a crime” vibe. A little over two months ago, performing Distributed Denial-of-Service (DDoS) attacks was not without consequences. Today, because of recent escalations in conflict, a more significant percentage of the general public believes that DDoS attacks are not a crime if they are morally aligned and part of a socially acceptable operation. But is this true? ….and what led to this current perception?

Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Mike Baca
Chief Information Officer
NM Taxation and Revenue Dept

Lorenzo Barraza
Director, Technology
Bernalillo Public Schools

Jose Diaz
Director, Information Services
Gerald Champion Regional Medical Center

Aaron Frankel
Information Security Officer
Tricore Reference Laboratories

Richard Garcia
Associate Director, infrastructure, Architecture, Operations
PNM Resources, Inc.

Mark Guillen
Manager, Information Technology
NM Legislative Council

Bill Halverson
Sr Technology Advisor
CNM, Ingenuity

Donna Harrington
Chief Technology Officer
Southwestern College

Matt Hesley
Manager, IT Security
Tricore Reference Laboratories

Darshana Kanabar
Deputy Chief Information Officer
NM Taxation and Revenue Dept

Mike Kelley
Chief Information Officer
Mesilla Valley Transportation

Pawel Kowalski
Manager, Information Technology
SDV Construction

Mike Mertz
Chief Information Officer
PNM Resources, Inc.

Nick Murrietta
Manager, Cyber Security
PNM Resources, Inc.

Joseph Navarrete
Chief Information Officer
NM Mortgage Finance Authority

Alan Roes
Manager, Information Technology
New Mexico Tech

Rick Sherman
Associate Vice President, IT
Rio Grande Credit Union

Thomas Sipf
Manager, Cybersecurity
Erisa Administrative Services

Dee Skinner
Director, IT Services
Haverland Carter LifeStyle Group

Randy Sole
Salesforce Admin/Developer
Presbyterian Healthcare Services

Richard Torrez
Vice President, Technology Officer
Southwest Capital Bank

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

SILVER SPONSORS

Aquila

Aquila

Aquila
Aquila’s Cyber Security professionals help safeguard organization’s critical assets with trusted and tested tools to proactively identify threats, automate quarantines, and analyze data to prevent future attacks.
Visit Website
Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
Armis

Armis

Armis
Armis is the global leader in cyber asset security. Fortune 500 companies trust our real-time, comprehensive asset intelligence to deliver full visibility and automated enforcement across every connected asset and environment. Armis helps organizations across any industry continuously secure their entire cyber-asset attack surface.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet helps organizations across the public and private sectors protect the systems, data, and services that keep businesses and communities running. From government agencies and schools to enterprises and service providers, leaders rely on Fortinet to secure critical infrastructure, ensure operational continuity, and defend against evolving cyber threats. Our Security Fabric platform unifies networking and security to deliver the visibility, control, and efficiency organizations need to operate confidently, whether virtual, in the cloud, or on-premises.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
Malwarebytes

Malwarebytes

Malwarebytes
Malwarebytes protects workplace productivity. We secure all your endpoints so employees can connect confidently, from anywhere. We combine analytics-driven, multi-layer threat protection and industry-leading incident response to both simplify and strengthen overall cybersecurity. You and your team stay up and running, so you can remain focused on driving your business.
Visit Website
Radware

Radware

Radware
Radware is a leader of application delivery and security solutions. Its award-winning solutions portfolio delivers full resilience for business-critical applications, maximum IT efficiency, and complete business agility.
Visit Website
Red Canary

Red Canary

Red Canary
The Red Canary Security Operations Platform, driven by purpose-built technology, security research, and threat intelligence, provides advanced threat detection and response across your entire IT estate to improve your security outcomes.
Visit Website

BRONZE SPONSORS

Abba Technologies

Abba Technologies

Abba Technologies
Abba Technologies is a premier IT services and solutions firm headquartered in Albuquerque, NM. We provide innovative, cost effective, and reliable IT solutions to Enterprise and Government customers throughout the United States. Our expertise includes Managed IT Services, Data Center & Cloud Solutions, Cybersecurity, IT Hardware & Software, and Networking. We’re celebrating 29 years in business this year! Contact us today for a free consultation.
Visit Website
Ardham

Ardham

Ardham
At Ardham Technologies, each member of the team is dedicated to providing you with extraordinary solutions to real IT problems. From computer and network maintenance to desktop support and more, we’re backed by years of expertise that you can depend on.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website

EXHIBITORS & ASSOCIATIONS

Adlumin

Adlumin

Adlumin
Adlumin's security and compliance automation platform helps organizations manage evolving threats and cybersecurity compliance requirements.
Visit Website
ANM

ANM

ANM
ANM is an innovative IT consulting company that specializes in network automation, data center, cloud, collaboration, security, A/V and Salesforce apps.
Visit Website
Barracuda

Barracuda

Barracuda
Barracuda Networks is the worldwide leader in Security, Application Delivery and Data Protection Solutions. More than 200,000 global customers trust Barracuda to safeguard their employees, data, and applications from a wide range of threats. Barracuda provides easy, comprehensive and affordable solutions for email protection, application protection, network protection and data protection. We are continually innovating to deliver tomorrow’s security technology, today.
Visit Website
HOLMANS USA

HOLMANS USA

HOLMANS USA
HOLMANS USA is leading provider of technology to federal, state, education, and commercial markets Specializing in Solutions for Data Center, Desktop Client, Printing, Mobility and more. With our national sales and service centers, dedicated inventory, customized eCommerce solutions, assets management, HOLMANS USA has been helping clients efficiently achieve their business goals for over 60 years.
Visit Website
IIA Albuquerque

IIA Albuquerque

IIA Albuquerque
The IIA is the internal audit profession's global voice, chief advocate, and principal educator. Generally, members work in internal auditing, risk management, governance, internal control, information technology audit, education, and security.
Visit Website
ISACA New Mexico

ISACA New Mexico

ISACA New Mexico
ISACA is a worldwide association of IS governance professionals. The association currently focuses on assurance, security, and governance and provides globally recognized certifications.
Visit Website
ISC2 Central New Mexico

ISC2 Central New Mexico

ISC2 Central New Mexico
Support and provide members and the community with resources and leadership to address cyber, information, software and infrastructure security to deliver value to the Albuquerque, Santa Fe, and Los Alamos areas.
Visit Website
New Mexico Technology Council

New Mexico Technology Council

New Mexico Technology Council
The New Mexico Technology Council (“Tech Council” or NMTC) is a member-driven association of businesses, organizations and tech professionals working together to promote the growth and success of New Mexico’s technology business sectors.
Visit Website
SHI

SHI

SHI
From designing cloud, data center and end user computing strategies that support your hybrid working model to delivering the hardware and software you need to run it, SHI is your complete IT partner.
Visit Website
Tanium

Tanium

Tanium
Tanium gives the world's largest enterprises and government organizations the unique power to secure, control and manage millions of endpoints across the enterprise. 
Visit Website
Total Asset Managers

Total Asset Managers

Total Asset Managers
TAM provides data center maintenance for Server, Storage, and Networking products. We help clients reduce OpEx and/or extend the life of equipment beyond OEM "End Of Service Life" or Warranty dates. We offer alternatives to OEM forced upgrade mandates.
Visit Website
VLCM

VLCM

VLCM
VLCM has been in business for over thirty years, and in that time, we’ve helped thousands of customers throughout the Rocky Mountain West find the proper solutions for their IT needs.
Visit Website

Interested in becoming part of our next Albuquerque event?

CONTACT US FOR INFO

Albuquerque

Albuquerque Marriott Pyramid North
Pyramid Ballroom
5151 San Francisco Road NE
Albuquerque, NM 87109

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.