F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Virtual Alaska 2021 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

April 15th, 2021
8:30am – 4:30pm

Virtual Conference
Multi-track seminars with Q&A
1-on-1 chat and networking
Hourly prize drawings

KEYNOTE: [1 CPE] You Are No Longer Forgotten: The Small Business Security Challenge

  Presented by Chris Roberts • Chief Security Strategist, Cynet

Seminar Schedule

  • Theater One
  • Theater Two
  • Theater Three
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] 2021 State of Malware

  Presented by Malwarebytes

Over the past year, the tools and tactics of cybercrime and cybersecurity adapted against a backdrop of enormous changes to our lives and businesses.

Join us to learn how cybercrime evolved in 2020 and identify ways to safeguard your organization against what’s out there.

We’ll explore:

  • Top threats for businesses and consumers
  • Emerging cybercrime trends and tactics
  • Solutions you can employ to thwart future attacks
Topics: Information Security
10:00 - 10:50 AM

[1 CPE] The Case for Automation: Why Every Business Needs It

  Presented by Aruba, a HPE Company

As networks evolved from delivering basic connectivity (wired and wireless) to more sophisticated needs, enterprise security has moved from a strong, wall methodology to untrusted connections for every user. Join us to learn how network automation can reduce the burden on IT staff to keep up with the latest networking requirements while safely connecting workers, customers, and citizens to critical services.

Topics: Infrastructure
11:00 - 11:50 AM

[1 CPE] Cybersecurity & the Resilient Organization

  Presented by Verizon

Aside from cyber-crime, business leaders have plenty to worry about, from transforming how they serve customers during a pandemic to evaluating the impact that new technologies will have on their industry and the competitive landscape. Verizon’s research shows that because they face so many daily challenges, some business leaders de-prioritize cybersecurity and simply hope for the best. But cybersecurity doesn’t have to be an overwhelmingly complex, time-consuming, or expensive task: implementing some basic “cyber-hygiene” into your organization and knowing about the most relevant threats can reduce the risk of a cyberattack. Verizon Security Evangelist David Grady will draw on data from Verizon's world-class research - including the annual Data Breach Investigations Report – and share some tips on how to get started.

Topics: Information Security
12:00 - 12:50 PM

[1 CPE] Remote Working – Here to Stay?

  Presented by INTERFACE Advisory Council

Remote working during the pandemic has proved to be beneficial for some companies and employees. Even as we forecast a return to the office soon, many will want to work remotely on a permanent basis.

Join the INTERFACE- Advisory Council for a look at what lies ahead with remote working. How are you adjusting your security procedures? Do you know if your end-users will return to the office? Also, we will address long term items when it comes to in person working for different industries. How much of a shift in business will we see? We will discuss how IT departments be involved in decision making and execution of policies.

Panelists:
Ulf Asplund • Manager of Technical Services, Alaska Court System
Paul Hinsberg • Sr Enterprise Architect, Alaska USA Federal Credit Union
Mark Merchant • Chief Information Security Officer, Municipality of Anchorage

Topics: Culture, Strategic Management
1:00 - 1:50 PM

[1 CPE] Stay Ahead: Prep and Protect Your Enterprise for a Post-Pandemic World

  Presented by Check Point Software

Organizations worldwide transformed their ways of working with the onset of the COVID-19 pandemic. Now, we’re all forced to face new uncertainties as we transition to a post-pandemic world. Meanwhile, threat actors and cybercriminals are evolving their tactics to take advantage of these hazy times and the pandemic’s disruption as seen by recent surges in attacks across all industry sectors. This new phase of the modern workforce threatens more disruptive change and unpredictability. Join us to better understand what organizations such as yours should be focusing on to avoid being the next victim and stay a step ahead of the world's leading cybercriminals.

Topics: Information Security, Strategic Management
2:00 - 2:50 PM

[1 CPE] Work-Life Effectiveness: The Impacts on Employees & Employers

  Presented by Alaska Communications

In this presentation, you will learn the basics of work-life effectiveness and understand how it impacts the company’s bottom line. There are seven key elements of work-life effectiveness. We will explore these elements, which include ideas on how to bring them to your organization. We will also address work-life and wellness issues caused by the COVID-19 pandemic.

Topics: Culture, Strategic Management
Chris RobertsChris RobertsChief Security Strategist, Cynet
3:00 - 3:50 PM

[1 CPE] You Are No Longer Forgotten: The Small Business Security Challenge

  Presented by Chris Roberts • Chief Security Strategist, Cynet

Most of the security industry is chasing “around” 31,000 larger enterprise sized companies for their business. The list is well known, circulated and targets are on the backs of ALL the C-Suite, most of the technical folks and the MSP/VARS that support them. The Security industry circles them like packs of hyena or vultures waiting for one of them to fall, get breached, or for a vendor to be thrown out… pouncing on the fresh kill with glee…

Meanwhile, you’re sitting there getting slaughtered by every adversary known to mankind because you ARE the forgotten, you’re too small for the multi-billion $$ cyber companies whom IF they decide to deal with you will flood you with MSA’s, SOW’s and NDA’s that would take a week’s worth of lawyer time JUST to understand, let alone realize that they’re not accountable for anything, unlikely to want to support you and in all honestly you’ll get a 1-800-YOU-AREN’T-SPECIAL number as your sole source of support.

We’re going to address the current situation, the state of play, and give you some thoughts, suggestions, ideas AND plans. We’ll provide resources on HOW to evaluate, where to look, what to do AND importantly we’ll do it because it’s what we’re doing. We live, breath and deal with this daily. We’ve sat in the meetings when the large cybersecurity companies state, “we’re done dealing with the SMB market” and we’ve got the battle scars from dealing with those subsequent consequences.

Chris is currently serving as a vCISO or advisor for a number of entities and organizations around the globe. His most recent projects are focused within the deception, identity, cryptography, Artificial Intelligence, and services space. Over the years, he's founded or worked with a number of folks specializing in OSINT/SIGING/HUMINT research, intelligence gathering, cryptography, and deception technologies. These days he’s working on spreading the risk, maturity, collaboration and communication word across the industry. (Likely while coding his EEG driven digital clone that’s monitoring his tea and biscuit consumption!)

Since the late 90’s Chris has been deeply involved with security R&D, consulting, and advisory services in his quest to protect and defend businesses and individuals against various types of attack. Prior to that he jumped out of planes for a living, visiting all sorts of interesting countries and cultures while doing his best to avoid getting shot at too often. (Before that, he managed to get various computers confiscated by a number of European entities.)

He’s considered one of the world’s foremost experts on counter threat intelligence and vulnerability research within the Information Security industry. He’s also getting a name for himself in the transportation arena, basically anything with wings, wheels, tracks, tyres, fins, props or paddles has been the target for research for the last 10-15 years…to interesting effect.

As one of the well-known hackers and researchers, Chris is routinely invited to speak at industry conferences. CNN, The Washington Post, WIRED, Business Insider, USA Today, Forbes, Newsweek, BBC News, Wall Street Journal, and numerous others have covered him in the media.

And worst case, to jog the memory, Chris was the researcher who gained global attention in 2015 for demonstrating the linkage between various aviation systems, both on the ground and while in the air that allowed the exploitation of attacks against flight control system.

Topics: Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] Look Before You Leap: How to Survive and Thrive During Your Cloud Migration

  Presented by Computer Task Group

The pandemic has accelerated digital transformation priorities and cloud computing has become a major focus for most IT organizations today. Yet only 37% of mid-market organizations have migrated to the cloud and a mere 17% of their workloads are actually in the cloud.*

With all of the benefits cloud computing offers—modernization, security, efficiency, and cost savings—what's holding so many organizations back from making the transition?

During this session, Phaedra Divras, CTG’s Director of Infrastructure, Support, and Operations Solutions for North America, and Rick Cruz, CTG’s Director of Application and Information Solutions for North America, will draw on their collective 60 years of industry experience to share lessons learned and practical strategies for successfully migrating to the cloud. You can expect to learn:

  • The big picture behind industry and market dynamics driving the push for cloud computing
  • Typical migration journeys and the advantages and disadvantages of each approach
  • Pitfalls and key considerations for achieving an optimal migration
  • When to be strategic vs. tactical during cloud migration planning

This presentation applies to all IT professionals, whether your organization has already implemented cloud computing or is looking to make the leap.

*Source: https://techaisle.com/blog/390-ww-midmarket-hybrid-cloud-penetration-has-reached-37-percent-and-17-percent-workload

Topics: Business Continuity / Disaster Recovery, Data Storage, Infrastructure
10:00 - 10:50 AM

[1 CPE] Cybersecurity Maturity Model Certification: How to Continue Working with DoD

  Presented by Structured

Companies working on government contracts in the Defense Information Base are required to protect sensitive information, including Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). These requirements are changing to a more stringent framework, as the self-reporting model with NIST SP 800-171 is being replaced with the Cybersecurity Maturity Model Certification (CMMC). CMMC will require a third-party auditor to provide the certification audit in a formalized and regimented process. Join this presentation to learn more about upcoming requirements from DFARS and the transition to these additional control standards. The presenter will be Rob Wayt, Director of Governance and Compliance from Structured Communication Systems, who is listed on the CMMC Accreditation Body marketplace as a Registered Practitioner.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Digital Transformation: What’s Next in a Post COVID World?

  Presented by Structured & Aruba

While the pandemic shuttered many businesses and wreaked havoc with supply chains, it also massively accelerated investment in digital operations in the cloud and at the intelligent edge. Many decisions were made in haste, arising from the need to just “keep the lights on.” The next iteration of our global pandemic response is to revisit these decisions; correct oversights in security, enterprise connectivity, and endpoint access; and chart a sound course forward. Join us and learn how to confidently navigate what comes next regarding your organization’s ability to deliver secure and satisfying user experiences in all critical capabilities across the enterprise.

Topics: Infrastructure
1:00 - 1:50 PM

[1 CPE] The Platform Approach and the Future of Cybersecurity

  Presented by Palo Alto Networks

The cyber threat landscape continues to present challenges to security practitioners. Each passing week brings a new notification of a game-changer event that puts infosec teams on the ropes. The job of infosec teams has grown in its complexity and the need to approach security differently is at the top of mind for leaders in our space. Hear from MK Palmore, Palo Alto Networks' Field CSO (Americas) and retired FBI Executive, on the growing demand for security that can scale to meet the challenges of the future.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Discover How SD-WAN Edge and Cloud Security are Enabling Digital Transformation

  Presented by Silver Peak

Adoption of cloud services and the explosive increase in mobile and IoT devices have driven enterprises to transform both their WAN and security architectures – not just one or the other. The strategic imperative is to deploy a more intelligent, highly automated software-defined wide area network (WAN) that can be seamlessly integrated with modern cloud-delivered security services. Gartner coined the term “secure access service edge” (SASE) to describe this cloud-first architecture. During this session, we’ll discuss:

  • SD-WAN and security considerations enterprises must address when migrating to a SASE architecture
  • How to address Zero Trust access security requirements for remote workers and IoT
  • Pros and cons of single vendor vs multi-vendor SASE implementations
Topics: Data Storage, Infrastructure
  • Sessions
9:00 - 9:50 AM

[1 CPE] Understanding the Cybersecurity Maturity Model Certification

  Presented by AT&T

This presentation will cover key details of the recently released Cybersecurity Maturity Model Certification (CMMC). This includes details on the CMMC's creation and enforcement, along with the key requirements of the certification process itself. The presentation will also include definitions to help attendees identify the different types of data covered by the CMMC and how they relate to the maturity levels. Additionally, Zach Curley, Senior GRC Consultant, will provide guidance on how to prepare for pre-assessments and audits. The end of the session will include time for Q&A so attendees can ask questions related to the presentation or related topics.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] CI/CD for Networking: Adopting DevOps Principles for a More Robust Network

  Presented by Infoblox

In recent years, continuous integration and continuous deployment, aka CI/CD, have become de facto standards for DevOps-minded software development organizations. Adoption of CI/CD enables software architects and IT specialists to create more flexible, secure and agile infrastructure with new features and functionality that are continually improved and deployed. While compute and storage aspects of environments have benefited greatly from CI/CD, network infrastructure has lagged behind.

This presentation pulls back the covers on efforts taking place to bring CI/CD philosophies to the work of revamping legacy, monolithic network architectures using cloud-native principles, microservices and containerization. The end goal is to create networks that are inherently more adaptable, scalable, automated and simpler to manage.

Speaker Bio: Glenn Sullivan is a Principal Product Manager for Emerging Technologies at Infoblox and joined the Infoblox team when SnapRoute, a company he co-founded in 2015, was acquired by Infoblox. At SnapRoute, Sullivan was responsible for product direction by advocating for the end-user. Prior to founding SnapRoute, Sullivan was responsible for building out hyperscale data center environments at Apple. In addition to core network operational functions, Sullivan led efforts to automate the lifecycle management of various platforms in a multivendor environment. Before Apple, Sullivan was a specialist support engineer on the LAN Switching team in Cisco TAC. While there, his specialty was in turning around customer sentiment by focusing on escalated issues and transforming the customer experience into a positive one. Sullivan has a BS in Network and Systems Administration from RIT (Rochester Institute of Technology).

Topics: Infrastructure, Unified Communications
1:00 - 1:50 PM

[1 CPE] Real-Time Defender Velocity: Code on Code Warfare

  Presented by SentinelOne

Organizations spend more money on cyber security tools every year, yet the number of breaches and the cost of these breaches continues to increase. A new approach is needed that relies on autonomous analysis that can respond at machine speed. By embracing automation, AI, and big data analytics, organizations can better prevent threats, find, and detect what is missed, provide contextual linking for forensic and threat hunting ¬– and even more importantly – self-heal and fully recover when necessary.

Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Darrell Aldridge
Technology Auditor
Credit Union 1

Ulf Asplund
Manager, Technical Services
Alaska Court System

Harry Banks
Department Chair
University of Alaska Computer Systems Technology

Rob Barnett
VP, Information Technology
Olgoonik Development, LLC

Mary Bradley
Deputy Director, Network Enterprise Ctr.
United States Army

Terence Cato
Manager, Information Security
AK Industrial Dev & Export Authority

Ron Duvall
Chief Technology Officer
AK Office of Information Technology

Dana Gonderzik
Information Security Manager
Alaska USA Credit Union

Patrick Gray
Director of Information Technology
Anchorage Fracture & Orthopedic Clinic

Paul Hinsberg
Sr Enterprise Architect
Alaska USA Federal Credit Union

Chris Javier
Manager, IT
Galena City School District

Lance Johnson
Risk Analyst Lead
USAA

Keith Lewis
Manager, Chief Network Services
AK Dept of Health & Social Services

Sioux-z H. Marshall
Chief Information Technology Officer
Municipality of Anchorage

Mark Merchant
Chief Information Security Officer
Municipality of Anchorage

Justin Michaud
Senior Program Manager
Mat-Su Borough School District

Janelle Mullen
Manager, Information Technology
Ak Dept of Health & Social Services

Aaron Mute
Director, Information Technology
Assoc of Village Council Presidents

David Reed
Information Systems Security Manager
Motorola Solutions

Thor Ryan
Chief Information Security Officer
Alaska Dept of Health & Social Svcs.

Bronn Salmon
Director, Information Technology
Sunshine Community Health Center

Mischaud Scruggs
Manager, Information Technology
Assets Inc

Amos Secoy
Director, Campus Technology Services
University of Alaska – Anchorage

Benjamin Shier
Chief Information Officer
University of Alaska, Anchorage

Timothy Shoemaker Sr.
Manager, Information Technology
General Dynamics Information Technology

Gary Short
Manager, IT Infrastructure
Northern Aviation Services

Keith Taylor
Manager, Enterprise Architecture
Alaska USA Federal Credit Union

Jerry Tibor
Manager, LAN
University of Alaska Anchorage

John Tibor
President
Network Users Group of Alaska

Hugh Towe
Manager, IT
State of Alaska Fish and Wildlife

RC Woodson
Vice President of IT/CIO
Bristol Bay Native Corporation

Eric Wren
Manager, Information Security Infrastructure
Chugach Electric

Dwayne Wright
Manager, Enterprise Infrastructure
Alaska National Insurance Company

Eric Wyatt
Director, Information Technology & CIO
Matanuska-Susitna Borough

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
Silver Peak

Silver Peak

Silver Peak
Silver Peak, recently acquired by HPE Aruba, delivers networking software that powers a self-driving wide area network (SD_WAN) that learns and adapts to requirements of the business to ensure the highest levels of end user and application performance.
Visit Website
Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

Alaska Communications

Alaska Communications

Alaska Communications
Alaska Communications is a trusted partner in broadband and managed IT for businesses, schools, healthcare providers, and state and local governments. We confidently provide the latest industry-specific solutions to help address the dynamics of your ever-changing business world.
Visit Website
AT&T

AT&T

AT&T
AT&T helps people connect in meaningful ways every day. We’re building FirstNet for first responders, creating next-generation mobile 5G, and delivering entertainment people love to talk about. Our smart, highly secure solutions serve over 3 million global businesses.
Visit Website
Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
CTG

CTG

CTG
CTG is a leading provider of IT solutions and services, serving as a catalyst for our clients’ digital transformation. We accelerate their project momentum and achievement of desired technology and business outcomes with agility and confidence.
Visit Website
Infoblox

Infoblox

Infoblox
Infoblox unites networking and security to deliver unmatched performance and protection. Trusted by Fortune 100 companies and emerging innovators, we provide real-time visibility and control over who and what connects to your network, so your organization runs faster and stops threats earlier.
Visit Website
Malwarebytes

Malwarebytes

Malwarebytes
Malwarebytes protects workplace productivity. We secure all your endpoints so employees can connect confidently, from anywhere. We combine analytics-driven, multi-layer threat protection and industry-leading incident response to both simplify and strengthen overall cybersecurity. You and your team stay up and running, so you can remain focused on driving your business.
Visit Website
SentinelOne

SentinelOne

SentinelOne
SentinelOne is the future of Endpoint Protection. It unifies prevention, detection and response in a single platform driven by sophisticated machine learning and intelligent automation. It can adapt your defenses against the most advanced cyber-attacks.
Visit Website
Verizon

Verizon

Verizon
We create connections that advance global business opportunities and enrich lives. Despite the challenges of today’s rapidly changing environments, the right technologies can help drive growth and performance, as well as improve the customer experience.
Visit Website

BRONZE SPONSORS

Extreme Networks

Extreme Networks

Extreme Networks
Extreme Networks, Inc. (EXTR) delivers software-driven networking solutions that help IT departments everywhere deliver the ultimate business outcome: stronger connections with customers, partners and employees.
Visit Website
Gigamon

Gigamon

Gigamon
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.
Visit Website
Imperva

Imperva

Imperva
Imperva is the cybersecurity leader whose mission is to protect data and all paths to it. With an integrated approach that combines edge, application and data security, Imperva protects companies through all stages of their digital journey.
Visit Website
MTA

MTA

MTA
MTA was established in 1953 as a locally owned and operated Alaskan co-op and built the state’s first and only all-terrestrial network. Ampersand (an MTA subsidiary) is the leading technology services provider delivering hybrid cloud hosting solutions, cybersecurity & risk management, and more.
Visit Website

EXHIBITORS & ASSOCIATIONS

ACP Alaska

ACP Alaska

ACP Alaska
ACP is the preeminent national voice of continuity professionals. We provide continuing professional development, knowledge and career opportunities to members while building public understanding around the world of the importance of continuity planning.
Visit Website
AFCEA Alaska

AFCEA Alaska

AFCEA Alaska
AFCEA International is a non-profit organization serving its members by providing a forum for the ethical exchange of information, and dedicated to increasing knowledge through the exploration of issues relevant to its members in information technology.
Visit Website
ARMA Alaska

ARMA Alaska

ARMA Alaska
The ARMA Alaska Chapter’s mission is to Promote and advance the Records and Information Management (RIM) profession and related fields through study, education, research, training, networking, outreach, and member recruitment and retention.
Visit Website
ASIS Alaska

ASIS Alaska

ASIS Alaska
ASIS is dedicated to increasing the effectiveness of security professionals by developing educational programs and materials that address broad security interests, such as the Annual Seminar and Exhibits, as well as specific security topics.
Visit Website
ExtraHop

ExtraHop

ExtraHop
ExtraHop delivers enterprise cyber analytics that allow you to quickly investigate threats, ensure the delivery of critical applications, and secure your investment in the cloud.
Visit Website
InfraGard Alaska

InfraGard Alaska

InfraGard Alaska
InfraGard is a partnership between the FBI and the private sector. It's an association of businesses,academic institutions,law enforcement agencies,and other participants dedicated who share information to prevent hostile acts against the U.S.
Visit Website
ISACA Anchorage

ISACA Anchorage

ISACA Anchorage
ISACA Anchorage is a local chapter of the international ISACA organization serving the Anchorage and Mat-Su areas. Our goal is to provide local IT audit, governance, and security professionals with the resources to the global ISACA organization.
Visit Website
Network Users Group Alaska

Network Users Group Alaska

Network Users Group Alaska
Our group is comprised of and focused toward computer network technicians, administrators, and professionals with the goal of offering support, continuing education, and training.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website
PMI Alaska

PMI Alaska

PMI Alaska
The PMI Alaska Chapter will be recognized as a dynamic organization of Professional Project Managers dedicated to serving the business and educational community of Alaska through the advancement of Project Management.
Visit Website
VMUG Anchorage

VMUG Anchorage

VMUG Anchorage
Officially launched in August of 2010, the VMware User Group (VMUG) is an independent, global, customer-led organization, created to maximize members’ use of VMware.
Visit Website

Interested in becoming part of our next Alaska event?

CONTACT US FOR INFO

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.