F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Alaska 2019 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

April 10th, 2019
8:30am – 4:30pm

Dena’ina Center
Tikahtnu
600 W. 7th Avenue
Anchorage, AK 99501

Directions & Parking

KEYNOTE: IT Strategy and Business Engagement

  Presented by R.C. Woodson • VP, Information Technology Doyon Limited

Seminar Schedule

VIEW FLOORPLAN
  • Theater One
  • Theater Two
  • Theater Three
  • Theater Four
  • Solutions Showcase
  • Check Point Mini Theater
  • AM Sessions
  • PM Sessions
  • Keynote
9:00 - 9:50 AM

IT Transformation: Building your Foundation for Innovation

  Presented by Dell EMC

In this session, we will share Dell Technologies' point-of-view regarding the key elements involved with transforming IT from a traditional siloed infrastructure organization to a market-oriented broker of services to the business. More specifically, topics discussed will include…The modernization of the data center (with a focus on converged systems, as well as the 'five core attributes of a modern architecture'). Automation of service delivery (with a focus on IaaS, Paas, Hybrid Cloud Platform and off premise offerings). Also, transformation of IT operations (with a focus on people, process and agility).

Topics: Information Security
10:00 - 10:50 AM

Transforming IT Operations with DevOps and Infrastructure Automation

  Presented by World Wide Technology

As modern organizations become increasingly dependent on evolving technology, there is an ever-increasing need for IT organizations to do more with less, decrease lead times of services, and reduce operational risk introduced by change. In this talk, we will explore how infrastructure teams are adopting DevOps principles and readily available tools such as Ansible, Git, and Jenkins to transform operational risk and catapult operational efficiency.

Join us while we examine the following topics:

  • Learn the motivations and paths organizations are taking in developing DevOps practices within their teams.
  • Hear and see practical examples of how organizations are reducing operational overhead through infrastructure automation.
  • Learn how you can get started applying similar practices within your own teams and organization.
Topics: Infrastructure
11:00 - 11:50 AM

PCI and Your Organizational Liability

  Presented by Structured Communication Systems

Payment card processing is a critical service many companies and organizations offer. But with this service comes the added responsibility to comply with PCI requirements, and the technical, administrative, and physical controls applicable to card processing environments. Failure to comply can result in costly fines. Plus, a breach of card holder information could have disastrous financial and public relations consequences for compromised merchants. Want to know more? With compelling and engaging content delivered by Rob Wayt, a PCI Qualified Security Assessor (QSA), you will learn the intricacies of these requirements, proper scoping, and how to mitigate risks that merchants have while card processing.

Topics: Information Security
12:00 - 12:50 PM

Earthquake: Manage the Panic

  Moderated by INTERFACE Advisory Council

The November 2018 Earthquake affected just about everyone in Alaska. In the immediate moments after, people were desperate to account for the safety of their loved ones. When it came to IT departments, a lot of work had to be done. Many lessons were learned from the earthquake. What do we need to do to adjust our backup plan regarding the items we didn't consider? Join the INTERFACE Advisory Council for an interactive discussion. Your experiences from November are welcome to be shared as we look to learn from that day.

Topics: Business Continuity / Disaster Recovery
1:00 - 1:50 PM

Evolving Your BC/DR Strategy to Protect Today’s Multi-Cloud Environments

  Presented by Unitrends

We are living in a "Less is More" world. IT Professionals are facing more work, projects, and risks than ever before, while having less time and money, and a rapidly decreasing tolerance of downtime. While external threats such as malware and natural disasters are prevalent and may cause significant downtime and data loss without the proper BCDR strategies, organizations must also be prepared to safeguard from within. Data continues to grow at an exponential rate, and not only on-premises. As cloud-delivered solutions such as IaaS and SaaS are rapidly adopted by an increasing number of organizations, these organizations must also consider their data protection strategies to address native gaps within these platforms. Join Adam Marget, Technical Demand Generation Specialist, Unitrends, as we'll explore the evolving landscape of data protection, cloud's growing role, BC/DR strategies to safeguard local and cloud-based workloads, and best practices in planning your DR approach.

Topics: Business Continuity / Disaster Recovery
2:00 - 2:50 PM

Disaster Preparedness: The Human Element

  Presented by Alaska Communications

Disaster preparedness is more than ensuring your data is backed up in a remote safe location. Preparing for a disaster also means designing and engineering a network to ensure it is up and running to provide support services to the people in a community, during their time of need. Hear from industry experts on network planning and technology.

Topics: Business Continuity / Disaster Recovery
VP, Information Technology Doyon Limited
3:00 - 3:50 PM

IT Strategy and Business Engagement

  Presented by R.C. Woodson • VP, Information Technology Doyon Limited

This presentation will help leaders to deliver an IT strategy based on business needs, not just intuition. Furthermore, it is no longer enough to generate a text document and call it an IT strategy. Stakeholder attention spans are growing shorter; in this case it is imperative that IT leaders create a visual IT strategy to show where IT is going. The speed of business is faster than ever before. This means that IT has a limited amount of time to consider business plans, understand their implications, and adapt. Most IT departments lack the skill to develop an IT strategic plan, resulting in a staggering 92% of IT departments surveyed claiming their IT strategies were less than adequate. Organizations spend enormous amounts of money on IT but cannot see its ROI or the value that IT adds to the organization. So, there is a critical need to move away from a superfluous strategic plan to clearly visualize the target state. As IT leaders we must articulate in terms that the business uses to ensure comprehension and compliance.

R.C. has over 30 years of experience in the IT industry, with over 15 years of senior executive experience in providing technology solutions to organizations. He has experience derived from a wide range of industries, both public and private. These industries include logistics, financial services, and the Department of Defense. He has taught information technology and business management courses at local colleges. Currently, R.C. is responsible for establishing, planning, and administering the overall Information Technology strategy, policies, and goals for the Doyon Limited. Doyon is one of the top ten Alaska regional corporations with more than a dozen subsidiary companies across multiple lines of business. Engineering, drilling operations, remote camp services, and security—together, Doyon companies blend expertise and technological muscle in support of smooth, safe, and successful operations in the North Slope oil fields. R.C. is known for his expertise in Strategy & Governance, Security & Risk, Mergers & Acquisitions, Server & Network Architectures, Distributed Systems and Enterprise Resource Application implementations. R.C. has installed, maintained and managed large enterprise resource applications. He is talented in efficiently creating and deploying IT solutions across many business models. He drives results and provides innovative methods to improve both IT operations and clients' bottom-lines. R.C. mentors and manages IT activities for subsidiary companies as well as the parent company. R.C. was the Spring 2018 Boardroom Events Midmarket CIO Award recipient for his work in solution selection and deployment. His company is currently engaged in transforming the business to adapt improving efficiency across the enterprise while continuing to streamline back-office IT operations. He serves a member of the AVTEC Technology Council and the Alaska InfraGard Board.

  • AM Sessions
  • PM Sessions
9:00 - 9:50 AM

The Current Malware Threat Landscape & Enterprise Grade Remediation

  Presented by Malwarebytes

Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.

This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.

Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.

Topics: Information Security
10:00 - 10:50 AM

Cybersecurity Is All About Protecting the “Seams”

  Presented by AT&T

The evolution of cybercrime coupled with digitalization has transformed our concepts of business assets and customer interaction. An organization's data and online presence is more important than ever. In cybersecurity terms, this increases the attack surface and increases the impact of a breach, making it a business level problem.

Digitalization continues to drive rapid changes in business models and network architectures. On the other hand, it also drives change in how cybercriminals operate by harvesting data and launching automated attacks at scale. However, security approaches have largely stayed the same, relying on reactive policy management, disparate technologies, point solutions and complex workflows. This is apparent as organizations continue to suffer data breaches as they struggle to integrate data, point solutions, security operations teams and processes.

Dispersed networks, an explosion of data, disparate technologies and complex security operations present cybercriminals with gaps or "seams" in organizations' security postures. Fighting this requires a coordinated and collaborative approach that seamlessly orchestrates best-of-breed people, process and technology. This must utilize industry standard best practices and be powered by visibility across the threat landscape as well as actionable threat intelligence across all threat vectors.

In this session, we will talk about some security best practices to address modern security challenges and provide an overview of some technology as well as process approaches.

Topics: Information Security
11:00 - 11:50 AM

The Value of a Reliable CMDB & Practical Steps to Get There

  Presented by ServiceNow

Why have a CMDB? What is needed to build one? How do I maintain one? Why do CMDB projects sometimes fail or end up incomplete? What are the major best practices? What pitfalls should I avoid? The concept of CMDBs has been around for over a decade now. Some CMDB projects are successful. Some fail, are abandoned, or never really get there. This presentation first revisits the value of spending the effort to establish a functional and reliable CMDB. We then discuss a road map, practical best practices, pitfalls and do’s and don’ts in order to successfully establish a reliable and maintainable CMDB.

Topics: Data Center Technology
12:10 - 12:45 PM

Elevate Your Fruit: A Layered Security Approach

  Presented by Mark Merchant • CISO, Municipality of Anchorage

As we are all well-aware, the CIS top 20 Critical Security Controls are a highly effective set of best practices developed by leading security experts from around the globe. If you are serious about protecting the confidentiality and integrity of your systems and information, effective implementation of these controls can certainly aid in "elevating your fruit to higher branches" and help keep it safe against the rapidly growing threat that exists today. In this presentation, I will touch on key concepts from the CIS Controls and identify some real technical examples of things that you can do in your organization without having to spend hundreds of thousands of dollars to achieve.

Topics: Information Security
1:00 - 1:50 PM

Transform Networking & Security

  Presented by GCSIT Solutions

In order to keep up with the increasingly dynamic, distributed nature of modern applications, security needs to be an intrinsic component of the infrastructure that applications and data live on, rather than a bolted-on afterthought.

We eplore how:

  • You can enable micro-segmentation on the network with VMware NSX to prevent the lateral spread of threats.
  • And how VMware vSphere and vSAN deliver at-rest data encryption.
Topics: Information Security
2:00 - 2:50 PM

The Data Hub: Aligning Data and Storage

  Presented by Pure Storage

The nature of compute itself is changing as analytics becomes a core capability in the enterprise data center. Technology providers must evolve the products they offer to meet the needs of this new world of data, and this is especially true in the world of storage. Data has become plentiful due to the promise of analytics coupled with new data sources such as edge computing. Enterprises struggle with finding a consistent view of their data to the various processing workflows that need that data. Traditional systems are not designed to deliver multiple streams of the same data with the varying levels of performance required by each of the workflows being deployed by successful and growing enterprises.

New storage and data architectures are needed to address the evolving needs of enterprise compute. We call this architecture a data hub. The data hub must deliver on a number of promises in order to fulfill the vision of a data driven enterprise. It must produce high throughput file and object storage and provide application-specific performance characteristics (e.g., latency, throughput, and input/output operations per second), while offering those application-specific capabilities to multiple clients simultaneously.

Topics: Data Storage
  • AM Sessions
  • PM Sessions
9:00 - 9:50 AM

No Network Needed?!?!

  Presented by Zscaler

It seems every day, we are bombarded with news of yet another breach and our personal information being traded and sold on the dark web/Internet. We lose sleep wondering if we have the right controls and policies in place to prevent our companies and our names from appearing in the next morning's headlines. Is it time for a different approach? What if we could get rid of our network so we no longer had to define complex boundaries and policies? Is it really possible to architect a system that removes all the traditional ingress and egress points? If we resign ourselves to the fact that it's not IF but WHEN our network gets breached…then why do we still have a network?

Topics: Information Security
10:00 - 10:50 AM

Extreme IT Security: Where IoT and Security Collide

  Presented by Xiologix

The use of IoT devices is proliferating in every industry, and with this growth comes risk—reports of IoT attacks increased 600 percent from 2016 to 2017. You must take a zero-trust approach to network security. You must develop a strategy that only allows "good behavior" rather than just defending against bad behavior and yesterday's threats. It is critical that your network security and zero-trust strategies encompass your IoT devices as well. Learn about the technology and practices that will help you sleep at night.

Topics: Information Security
11:00 - 11:50 AM

Architecting the New SD-WAN Edge for the Cloud-first Enterprise

  Presented by Silver Peak Systems

Adoption of cloud services has driven enterprises to re-think WAN architecture. Architectures based on traditional, manually-programmed routers can't keep pace. A business-driven SD-WAN can provide secure direct connections from the branch to SaaS/IaaS across the internet, significantly increasing application performance resulting in a superior end-user QoEx (Quality of Experience). By integrating SD-WAN, WAN optimization, routing and security in a single unified platform, enterprises can simplify branch WAN edge architecture, accelerating time to value and dramatically reducing operational costs. From a centralized SD-WAN orchestrator, application priorities and QoS and security policies may be configured and assigned to automate traffic handling across the WAN. A single mouse click distributes SD-WAN configuration parameters to all sites, improving operational efficiency and minimizing the potential for human errors that can negatively impact application availability and enterprise security. This session will describe why SD-WAN adoption continues at a breakneck pace because of the user productivity, agility and cost savings benefits that a business-driven SD-WAN delivers.

Topics: Infrastructure
12:10 - 12:45 PM

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today's businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Topics: Information Security
1:00 - 1:50 PM

Best Practices for Securing and Monitoring Microservices and Linux

  Presented by Sysdig

Containers and microservices are designed to provide a reliable and low-cost way for teams to build and ship distributed applications. However, they also add extra layers of abstraction and orchestration to your environment that hinder your ability to do performance monitoring and security enforcement. Many challenges companies face in this world are similar to that of the traditional Linux world; however, the microservices layer adds additional complexity.

We'll discuss how to overcome this challenge and specifically discuss:

  • Benefits and drawbacks of different approaches to data collection in containers
  • How using metadata from orchestrators like Kubernetes helps optimize and secure your containers
  • Best practices for alerting and compliance in a distributed ephemeral infrastructure
  • How troubleshooting and forensics has changed in containerized environments

Topics: Information Security
2:00 - 2:50 PM

Master the Edge: How to Achieve Context-Aware, Secure Access in a Mobile Era

  Presented by Aruba & Structured

In this session you will discover how to deploy an open, multi-vendor Enterprise security framework that gives security and IT teams an integrated way to gain visibility, control and advanced threat defense. Learn about security prioritization and machine learning that enable organizations to leverage their existing third-party solutions to better protect their investments and implement proactive risk controls.

  • AM Sessions
  • PM Sessions
9:00 - 9:50 AM

Evolving Your BC/DR Strategy to Protect Today’s Multi-Cloud Environments

  Presented by Unitrends

We are living in a "Less is More" world. IT Professionals are facing more work, projects, and risks than ever before, while having less time and money, and a rapidly decreasing tolerance of downtime. While external threats such as malware and natural disasters are prevalent and may cause significant downtime and data loss without the proper BCDR strategies, organizations must also be prepared to safeguard from within. Data continues to grow at an exponential rate, and not only on-premises. As cloud-delivered solutions such as IaaS and SaaS are rapidly adopted by an increasing number of organizations, these organizations must also consider their data protection strategies to address native gaps within these platforms. Join Adam Marget, Technical Demand Generation Specialist, Unitrends, as we'll explore the evolving landscape of data protection, cloud's growing role, BC/DR strategies to safeguard local and cloud-based workloads, and best practices in planning your DR approach.

Topics: Business Continuity / Disaster Recovery
10:00 - 10:50 AM

A New Era for Data Protection: Converged DR and Backup

  Presented by Zerto

In today's always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. Being prepared for any data related disaster is key!

  • The cost and business impact of downtime and data loss can be immense
  • Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by software problems and cyber security related disasters
  • Having a plan and process in place will help you mitigate the impact of an outage on your business

In this presentation we will address the challenges, needs, strategies, and solutions.

Topics: Business Continuity / Disaster Recovery
11:00 - 11:50 AM

Treating Your Information as an Asset: A Holistic Strategy

  Presented by CTG

All organizations have assets — the valuable resources needed to function as an effective business. And Although it might not appear on your balance sheet, data is one of the most valuable assets an organization owns and, like all assets, must be identified, created and maintained.

"Information assets" should take advantage of clearly defined goals, roles and responsibilities, business processes and ownership. In this presentation, we will outline the three concrete steps your organization can follow to realize the tangible benefits of this highly valuable corporate asset and discuss how to derive value from your data at multiple points in the journey to becoming a data-centric organization.

Topics: Strategic Management
1:00 - 1:50 PM

Infrastructure Modernization: A Framework for Digital Transformation

  Presented by World Wide Technology

As IT operational models evolve, it is becoming increasingly important to align with lines of business on speed to deployment, simplifying management, and creating visibility on metrics.

In this talk we will explore how IT Operations and lines of business are converging efforts and creating brand value by enabling next gen technology through automation, digital strategy, and analytics tools at scale.

Topics: Infrastructure
2:00 - 2:50 PM

Mitigate Cyber Risks: Visibility & Response

  Presented by RSA, the Security Division of Dell EMC

Cyber-attack risks are more prominent and widespread in today's digital environment. Organizations struggle to respond to the evolving threat landscape—a challenge compounded by visibility and process gaps created by functional silos. This results in uncoordinated responses to cyber incidents that magnify financial, operational, reputational and compliance risks for businesses. This session will cover recommended steps to gain visibility and mitigate ongoing risk.

Topics: Information Security
  • AM Sessions
10:00 - 10:50 AM

Mobile Threat Landscape/Mobile Hacking

  Presented by Symantec

Today's modern operating systems, like iOS and Android, are designed for ubiquitous and wireless access from anywhere in the world and have very different use cases and security requirements compared with traditional PCs and servers. Mobile devices are on and connected 24/7, and often owned and managed by individuals, dramatically increasing the attack surface relative to PCs. Malicious hackers have shifted much of their attention to these new operating systems that may provide a direct link into large companies with valuable assets worth stealing. Today, their methods are less focused on broad and annoying attacks on consumers and more on targeted attacks on specific individuals in specific organizations who have the right access levels to high-value assets. Well-researched social engineering exploits, combined with system vulnerabilities, make these attacks highly effective, even against smart and educated individuals. Solutions exist that protect companies from mobile cyber-attacks by securing mobile devices, whether owned by the company or the individual, from the entire landscape of mobile threats-including malware, network-based threats, vulnerability exploits and other targeted attacks, without changing the mobile user experience, compromising user privacy or adding extra burden to IT. Today we will discuss the Mobile Threat Landscape, show an example of what a Mobile Threat looks like, and discuss best practices to protect your Mobile Data.

11:00 - 11:50 AM

How to Build a SOC with Limited Resources

  Presented by LogRhythm

In a perfect world, your organization would staff a 24x7 Security Operation Center, and have no trouble finding the budget or talent to do so. But the truth is, most organizations can't afford a 24x7 SOC. The cost of having well-trained analysts onsite at all times outweighs the benefits.

If your organization is making do with an informal Security Operation Center, you may be facing delays in responding to incidents. You may even fear that incidents are going unnoticed. It's a dangerous situation.

Organizations need to think of security operations as a critical business process. Effective security operations are the first line of defense when it comes to preventing cyberattacks. To accomplish this, organizations need mature programs that leverage people, processes, and technology to rapidly detect and respond to sophisticated attacks.

The purpose of this presentation is to provide you guidance and a framework that you can apply to building, assessing, and maintaining your security operations center to ensure its success throughout the business lifecycle.

  • AM Sessions
  • PM Sessions
9:00 - 9:50 AM

Cloud Security: Covering Your SaaS

  Presented by Check Point Software Technologies

As companies migrate to Cloud services, security often becomes an afterthought. Stop by and learn how Check Point can help keep you from getting burnt.

10:00 - 10:50 AM

Cloud Security: Covering Your SaaS

  Presented by Check Point Software Technologies

Securing owned and BYOD assets has become a challenge for IT professionals. We will discuss how to create a proper layered and protected Mobile Device security strategy.

11:00 - 11:50 AM

Cloud Security: Covering Your SaaS

  Presented by Check Point Software Technologies

Our speaker will cover current threats and trends in IT security, identify vectors and provide a layered defense to protect as you move your data beyond the perimeter.

1:00 - 1:50 PM

Cloud Security: Covering Your SaaS

  Presented by Check Point Software Technologies

As companies migrate to Cloud services, security often becomes an afterthought. Stop by and learn how Check Point can help keep you from getting burnt.

2:00 - 2:50 PM

Cloud Security: Covering Your SaaS

  Presented by Check Point Software Technologies

Securing owned and BYOD assets has become a challenge for IT professionals. We will discuss how to create a proper layered and protected Mobile Device security strategy.

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Koenraad Adams
Chief Information Officer
Adams IT

Darrell Aldridge
Technology Auditor
Credit Union 1

Ulf Asplund
Manager, Technical Services
Alaska Court System

Lyle Austin
Manager, Information Technology
Kinney Engineering, LLC.

Lara Baker
Chief Technology Officer
Bedrock Alaska, LLC

Rob Barnett
Director, IT
Olgoonik Development, LLC

Jim Bates
President
BIG

Pat Berry
VP, Chief Audit Executive
Credit Union 1

Mary Bradley
Deputy Director, Network Enterprise Ctr.
United States Army

Tom Carrell
Chief Information Officer
Udelhoven Companies

Terence Cato
Manager, Information Security
AK Industrial Dev & Export Authority

David Edge
Manager, IT Security
US Bureau of Land Management

Dana Gonderzik
Information Systems Auditor II
Alaska USA Credit Union

Chris Javier
Manager, IT
Galena City School District

Chris  Letterman
Principal Cyber Security Consultant 
Wostmann & Associates

Mark Merchant
Chief Information Security Officer
Municipality of Anchorage

Justin Michaud
Senior Program Manager
Mat-Su Borough School District

Doug Miller
Sr. Management Consultant
Wostmann & Associates

Janelle Mullen
Manager, Information Technology
Ak Dept of Health & Social Services

Aaron Mute
Director, IT Operations
Assoc of Village Council Presidents

Natalie Newman
Chief, Customer Service Center
59th Signal Battalion

Adam Paulick
Chief Information Officer
University of Alaska, Anchorage

John Ramey
Sr VP, Information Technology
Alaska National Insurance

David Reed
Information Systems Security Manager
Motorola Solutions

Thor Ryan
Department Security Officer
Alaska Dept of Health & Social Svcs.

Mischaud Scruggs
Manager, Information Technology
Assets Inc

Timothy Shoemaker Sr.
Manager, Information Technology
General Dynamics Information Technology

Larry Smith
Manager, Information Technology
Brooks Range Petroleum

Vijaya Srinivasan
Project Manager
AK Office of Information Technology

Jerry Tibor
Manager, LAN
University of Alaska – Anchorage

John Tibor
President
Network Users Group of Alaska

Hugh Towe
Manager, IT
State of Alaska Fish and Wildlife

David Vanzant
VP, Enterprise Security
Alaska USA Federal Credit Union

Shannon Wold
Manager, Information Systems
SCA Alaska Surgery Center

RC Woodson
Vice President of Information Technology
Doyon Limited

Eric Wyatt
Director, Information Technology & CIO
Matanuska-Susitna Borough

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Dell EMC

Dell EMC

Dell EMC
Dell EMC enables IT and digital business transformation through hybrid cloud and big-data solutions, built on a modern data center infrastructure that incorporates industry-leading converged infrastructure, servers, storage, and cybersecurity technologies
Visit Website
Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website
Unitrends

Unitrends

Unitrends
Unitrends is trusted by IT leaders worldwide who know that in today's digital world protecting their ideas and keeping their business running is non-negotiable. The company’s Connected Continuity Platform protects virtual, physical, + cloud based systems.
Visit Website
World Wide Technology

World Wide Technology

World Wide Technology
World Wide Technology (WWT) WWT, a $20B, privately held technology solutions provider leading the AI and Digital Revolution, has over 30 years of experience helping the world's largest organizations make the right technology decisions faster. Commercial enterprise, public sector and service provider clients work with WWT from strategy to execution bolstered by hands-on access to cutting-edge capabilities across infrastructure, data and AI, security, cloud and more through the Advanced Technology Center.
Visit Website

SILVER SPONSORS

Alaska Communications

Alaska Communications

Alaska Communications
Alaska Communications is a trusted partner in broadband and managed IT for businesses, schools, healthcare providers, and state and local governments. We confidently provide the latest industry-specific solutions to help address the dynamics of your ever-changing business world.
Visit Website
AT&T

AT&T

AT&T
AT&T helps people connect in meaningful ways every day. We’re building FirstNet for first responders, creating next-generation mobile 5G, and delivering entertainment people love to talk about. Our smart, highly secure solutions serve over 3 million global businesses.
Visit Website
CTG

CTG

CTG
CTG is a leading provider of IT solutions and services, serving as a catalyst for our clients’ digital transformation. We accelerate their project momentum and achievement of desired technology and business outcomes with agility and confidence.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
Everpure

Everpure

Everpure
Create an Enterprise Data Cloud that unifies access, simplifies management, and unlocks the value of your data—only with the Everpure platform.
Visit Website
GCSIT

GCSIT

GCSIT
GCSIT is a different kind of engineering firm. We act as your personal technology optimization team to create and maintain custom-built, agile infrastructure. We help you transition to the right technology solutions to better handle complex and dynamic challenges.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
LogRhythm

LogRhythm

LogRhythm
LogRhythm, Inc. is an independent security intelligence company that integrates security information and event management, log management, file integrity monitoring, network forensics, and host forensics.
Visit Website
Malwarebytes

Malwarebytes

Malwarebytes
Malwarebytes protects workplace productivity. We secure all your endpoints so employees can connect confidently, from anywhere. We combine analytics-driven, multi-layer threat protection and industry-leading incident response to both simplify and strengthen overall cybersecurity. You and your team stay up and running, so you can remain focused on driving your business.
Visit Website
ServiceNow

ServiceNow

ServiceNow
ServiceNow is changing the way people work. ServiceNow provides service management for every department in the enterprise including IT, human resources, facilities, field service and more.
Visit Website
Silver Peak

Silver Peak

Silver Peak
Silver Peak, recently acquired by HPE Aruba, delivers networking software that powers a self-driving wide area network (SD_WAN) that learns and adapts to requirements of the business to ensure the highest levels of end user and application performance.
Visit Website
SoftwareONE

SoftwareONE

SoftwareONE
SoftwareONE, the leader in software and cloud portfolio management, helps optimize IT spend, on-prem and in the cloud. PyraCloud, coupled with Software Portfolio Management services, ensure the maximum return on our customers' total software investment.
Visit Website
Symantec

Symantec

Symantec
Symantec helps organizations, governments and people secure their most important data wherever it lives. Organizations look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure.
Visit Website
Sysdig

Sysdig

Sysdig
Sysdig is the cloud-native intelligence company. We have created the only unified platform to deliver container security, monitoring, and forensics in a microservices-friendly architecture.
Visit Website
Xiologix

Xiologix

Xiologix
Xiologix is a technology solution provider of business driven multi-vendor IT solutions to customers throughout the US and Canada. They offer a wide variety of hardware and software products from the world's leading IT companies.
Visit Website
Zscaler

Zscaler

Zscaler
As a leader in Gartner’s Magic Quadrant, Zscaler enforces business policy, mitigates risk and provides twice the functionality at a fraction of the cost of current solutions, utilizing a multi-tenant, globally-deployed infrastructure.
Visit Website

BRONZE SPONSORS

10ZiG Technology

10ZiG Technology

10ZiG Technology
10ZiG Technology is a world-market leader in Thin & Zero Client endpoint devices for VDI. 10ZiG offers Intel and AMD based Dual and Quad Core Thin & Zero Clients for VMware, Citrix, and Microsoft environments. Free demo devices are available at 10ZiG.com.
Visit Website
Cloudian

Cloudian

Cloudian
Cloudian turns information into insight with a scalable platform that consolidates, manages and protects enterprise data. Cloudian brings cloud technology and economics to the data center with uncompromising data durability, intuitive management tools and the industry’s most compatible S3 API.
Visit Website
Gigamon

Gigamon

Gigamon
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.
Visit Website
nCipher Security

nCipher Security

nCipher Security
nCipher Security, a leader in the hardware security module (HSM) market, empowers world-leading organizations by delivering trust, integrity and control to their business critical information and applications, IoT, blockchain and digital payments.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website
Qumulo

Qumulo

Qumulo
Qumulo, the leader in data-aware scale-out NAS, helps CIOs and storage administrators store, manage and curate enormous numbers of digital assets.
Visit Website
Scale Computing

Scale Computing

Scale Computing
Scale Computing's highly-automated edge infrastructure, virtualization platform, & hyperconverged solutions can handle all of your IT infrastructure needs.
Visit Website
Skybox Security

Skybox Security

Skybox Security
Skybox arms security teams with a powerful set of security management solutions that extract insight from security data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address vulnerabilities and threat exposures.
Visit Website
Western Digital

Western Digital

Western Digital
Western Digital creates environments for data to thrive, helping customers capture, preserve, access and transform an ever-increasing diversity of data.
Visit Website

EXHIBITORS & ASSOCIATIONS

ACP Alaska

ACP Alaska

ACP Alaska
ACP is the preeminent national voice of continuity professionals. We provide continuing professional development, knowledge and career opportunities to members while building public understanding around the world of the importance of continuity planning.
Visit Website
AFCEA Alaska

AFCEA Alaska

AFCEA Alaska
AFCEA International is a non-profit organization serving its members by providing a forum for the ethical exchange of information, and dedicated to increasing knowledge through the exploration of issues relevant to its members in information technology.
Visit Website
Alaska Developers Alliance

Alaska Developers Alliance

Alaska Developers Alliance
Our goal is to build a statewide developer community in Alaska. We aim to offer mentorship opportunities with community projects and create developer bootcamps. We plan to partner with small businesses that need tech help.
Visit Website
ARMA Alaska

ARMA Alaska

ARMA Alaska
The ARMA Alaska Chapter’s mission is to Promote and advance the Records and Information Management (RIM) profession and related fields through study, education, research, training, networking, outreach, and member recruitment and retention.
Visit Website
ASIS Alaska

ASIS Alaska

ASIS Alaska
ASIS is dedicated to increasing the effectiveness of security professionals by developing educational programs and materials that address broad security interests, such as the Annual Seminar and Exhibits, as well as specific security topics.
Visit Website
Cisco Meraki

Cisco Meraki

Cisco Meraki
Cisco is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. Cisco delivers intelligent cybersecurity for the real world.
Visit Website
Citrix

Citrix

Citrix
Citrix Systems is the global leader and the most trusted name in application delivery infrastructure. More than 200,000 organizations worldwide rely on Citrix to deliver applications with the best performance, highest security and lowest cost.
Visit Website
Cohesity

Cohesity

Cohesity
Cohesity delivers a web-scale platform that simplifies data protection, consolidates file and object services, provides instant access to test/dev copies, spans from the edge to the cloud, and performs in-place searches and analytics.
Visit Website
CommScope

CommScope

CommScope
Advancing broadband enterprise and wireless networks to power progress and create lasting connections.
Visit Website
Commvault

Commvault

Commvault
Commvault is a worldwide leader in delivering data readiness. Commvault's backup and recovery software enables you to protect, manage, and use your data, while managing it in a consistent, compliant way.
Visit Website
CompTIA AITP Anchorage

CompTIA AITP Anchorage

CompTIA AITP Anchorage
The Anchorage Chapter is the local community of members of the Association of Information Technology Professionals. The Anchorage Chapter holds monthly meetings on the 1st Wednesday of the month.
Visit Website
CrowdStrike

CrowdStrike

CrowdStrike
CrowdStrike® provides cloud-delivered endpoint and workload protection. Leveraging artificial intelligence (AI), the CrowdStrike Falcon® platform protects customers against cyberattacks on endpoints and workloads on or off the network by offering visibility and protection across the enterprise.
Visit Website
Datrium

Datrium

Datrium
Datrium, the leader in automated cloud-native disaster recovery, enables enterprises to get failproof on-demand disaster recovery in the cloud, recover quickly from ransomware attacks and radically simplify data management. Datrium’s industry-leading disaster recovery (DR) with built-in backup is transforming the DR market, enabling enterprises to only pay for recovery when disaster strikes or for testing.
Visit Website
Extreme Networks

Extreme Networks

Extreme Networks
Extreme Networks, Inc. (EXTR) delivers software-driven networking solutions that help IT departments everywhere deliver the ultimate business outcome: stronger connections with customers, partners and employees.
Visit Website
F5 Networks

F5 Networks

F5 Networks
F5 provides solutions for an application world. F5 helps organizations seamlessly scale cloud, data center, telecommunications, and software defined networking deployments to successfully deliver applications and services to anyone,anywhere, at any time.
Visit Website
Fidelis Cybersecurity

Fidelis Cybersecurity

Fidelis Cybersecurity
Fidelis Cybersecurity protects the world’s most sensitive data by equipping organizations to detect, investigate and stop advanced cyber attacks.With our Fidelis Network and Endpoint Platform, customers can get one step ahead of any attacker.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet helps organizations across the public and private sectors protect the systems, data, and services that keep businesses and communities running. From government agencies and schools to enterprises and service providers, leaders rely on Fortinet to secure critical infrastructure, ensure operational continuity, and defend against evolving cyber threats. Our Security Fabric platform unifies networking and security to deliver the visibility, control, and efficiency organizations need to operate confidently, whether virtual, in the cloud, or on-premises.
Visit Website
Gemalto

Gemalto

Gemalto
Gemalto brings trust to an increasingly connected world. We do this by delivering software and other technologies to businesses and governments that helps them authenticate identities and protect data.
Visit Website
Graybar

Graybar

Graybar
Graybar, a leader in the distribution of high quality electrical, communications and data networking products, stocks and sells from thousands of manufacturers.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
HPE Juniper Networking

HPE Juniper Networking

HPE Juniper Networking
Juniper Networks is now part of HPE. Together, we're building industry-leading, secure, AI-native networks – purpose-built with and for AI. As AI and networking converge, we're driving a bold transformation across enterprises, service providers, and cloud operators.
Visit Website
IGEL Technology

IGEL Technology

IGEL Technology
IGEL provides next-gen edge OS endpoint security, optimization, and control solutions for cloud workspaces and virtual desktops.
Visit Website
IIA Alaska

IIA Alaska

IIA Alaska
The IIA is the internal audit profession’s global voice, recognized authority, and principal educator. Generally, members work in internal auditing, risk management, governance, internal control, information technology audit, education, and security.
Visit Website
Infoblox

Infoblox

Infoblox
Infoblox unites networking and security to deliver unmatched performance and protection. Trusted by Fortune 100 companies and emerging innovators, we provide real-time visibility and control over who and what connects to your network, so your organization runs faster and stops threats earlier.
Visit Website
InfraGard Alaska

InfraGard Alaska

InfraGard Alaska
InfraGard is a partnership between the FBI and the private sector. It's an association of businesses,academic institutions,law enforcement agencies,and other participants dedicated who share information to prevent hostile acts against the U.S.
Visit Website
ISACA Anchorage

ISACA Anchorage

ISACA Anchorage
ISACA Anchorage is a local chapter of the international ISACA organization serving the Anchorage and Mat-Su areas. Our goal is to provide local IT audit, governance, and security professionals with the resources to the global ISACA organization.
Visit Website
ISC2 South Central Alaska

ISC2 South Central Alaska

ISC2 South Central Alaska
The goal of ISC2 South Central Alaska is to advance the practice of information security by sharing knowledge, educating practitioners, and assisting the public at large on how to protect and defend against information security threats.
Visit Website
Ixia

Ixia

Ixia
Ixia delivers a powerful combination of innovative solutions and trusted insight to support your network and security products. Ixia offers an extensive array of solutions in testing, visibility, and security. For more information visit www.ixiacom.com.
Visit Website
Lewis and Lewis Computer Store

Lewis and Lewis Computer Store

Lewis and Lewis Computer Store
Lewis & Lewis Computer Store has added to following competitive pricing specialties to our business: toner and ink, multi-function printer devices, printers, large-format printers, media, computers, repair services, and managed network services.
Visit Website
Link SourceIT

Link SourceIT

Link SourceIT
Link Source IT is a complete IT services provider. We provide clients with the highest degree of support for their IT projects by offering solutions tailored to fit the unique needs of their organization.
Visit Website
LMJ Consulting

LMJ Consulting

LMJ Consulting
LMJ Consulting is an Alaskan based provider of CIO caliber managed IT services along with security and compliance.
Visit Website
Network Users Group Alaska

Network Users Group Alaska

Network Users Group Alaska
Our group is comprised of and focused toward computer network technicians, administrators, and professionals with the goal of offering support, continuing education, and training.
Visit Website
Nutanix

Nutanix

Nutanix
Nutanix makes IT infrastructure invisible with an enterprise cloud platform that delivers the agility and economics of the public cloud, without sacrificing the security and control of on-premises infrastructure.
Visit Website
PMI Alaska

PMI Alaska

PMI Alaska
The PMI Alaska Chapter will be recognized as a dynamic organization of Professional Project Managers dedicated to serving the business and educational community of Alaska through the advancement of Project Management.
Visit Website
RSA

RSA

RSA
RSA NetWitness® Suite is a threat detection and response platform that allows security teams to rapidly detect and understand the full scope of a compromise by leveraging logs, packets, endpoints and threat intelligence.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website
SentinelOne

SentinelOne

SentinelOne
SentinelOne is the future of Endpoint Protection. It unifies prevention, detection and response in a single platform driven by sophisticated machine learning and intelligent automation. It can adapt your defenses against the most advanced cyber-attacks.
Visit Website
Threat Informant

Threat Informant

Threat Informant
Threat Informant is an Anchorage Alaska based information security company that protects their customers by providing in-depth threat analysis, event monitoring, and information security consulting.
Visit Website
Varonis

Varonis

Varonis
Varonis is a pioneer in data security and analytics, specializing in software for data protection, threat detection and response, and compliance. Varonis protects enterprise data by analyzing data activity, perimeter telemetry, and user behavior; prevents disaster by locking down sensitive data; and efficiently sustains a secure state with automation.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website
Verizon

Verizon

Verizon
We create connections that advance global business opportunities and enrich lives. Despite the challenges of today’s rapidly changing environments, the right technologies can help drive growth and performance, as well as improve the customer experience.
Visit Website
VMUG

VMUG

VMUG
Officially launched in August of 2010, the VMware User Group (VMUG) is an independent, global, customer-led organization, created to maximize members’ use of VMware.
Visit Website
WorkSafe Technologies

WorkSafe Technologies

WorkSafe Technologies
WorkSafe Technologies is a leading authority in seismic protection. WorkSafe Technologies' ISO-Base seismic isolation technology is the most effective way to protect mission-critical and expensive electronic equipment in the event of an earthquake.
Visit Website
Wowrack

Wowrack

Wowrack
Wowrack is a global cloud service provider; offering various Hosting services including Managed Hosting Solutions, Dedicated Server Solutions, Colocation, Virtualization, Disaster Recovery, Backup services and much more!
Visit Website

Interested in becoming part of our next Alaska event?

CONTACT US FOR INFO

Alaska

Dena’ina Center
Tikahtnu
600 W. 7th Avenue
Anchorage, AK 99501

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.