F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Boise 2019 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

August 29th, 2019
8:30am – 4:30pm

Boise Centre
Grand Ballroom 100
850 W. Front Street
Boise, ID 83702

Directions & Parking

KEYNOTE: Ohh La La: I Wish That I Knew What I Know Now When I Was Younger

  Presented by Max Davis-Johnson • CIO at Boise State University

Seminar Schedule

VIEW FLOORPLAN
  • Theater One
  • Theater Two
  • Theater Three
  • Theater Four
  • AM Sessions
  • PM Sessions
  • Keynote
9:00 - 9:50 AM

Leveraging AI to Defend Against Insider Threats in Your Digital Landscape

  Presented by Vanguard Infrastructures & HPE

The single largest vulnerability to a company's intellectual property (IP) is their employee or the trusted insider; the person with the keys to the kingdom. However, recent media and government disclosures have expanded this threat to include machine compromises installed during manufacturing. So, the threat could come from the trusted insider or the machine an unwitting employee is utilizing. Too few companies have a strategy to adequately combat these vulnerabilities, mainly due to a lack of knowledge the events are taking place. Vanguard Infrastructures presents a strategy that marries observed human behaviors, demeanors, actions, etc., with artificial intelligence and machine learning to assist companies by providing data and creating visibility into network events that might be a threat to the company. This presentation's goal is to put more power into the hands of the company to protect their IP, identify potential problem behaviors of trusted employees and machines, and assist the company in ensuring their future.

Moderator:

  • Troy Cooper • Vanguard Infrastructures CEO Co-Founder

Panel Experts:

  • Vijay Richard • Vanguard Infrastructures Exec VP Co-Founder
  • Chris Kaufman • Vanguard Infrastructures Chief AI Strategist
  • Ann Hinkle • Vanguard Infrastructure Chief of Security Services
  • Scott Olsen • HPE Enterprise Architect
Topics: Information Security
10:00 - 10:50 AM

The Changing Role of IT in the Business: an Update from the Road…

  Presented by CompuNet

The Speaker from CompuNet will use several unconventional examples to illustrate some of the drivers changing the role of IT in business. The presentation will include interactive polling (bring your phone). He will end with a focus on adding value, staying secure and remaining relevant.

Topics: Information Security
11:00 - 11:50 AM

Achieving Your Best ROI on Today’s 3rd Generation Security Solutions

  Presented by Fortinet

The old adage of having just a firewall, let alone a limited featured stateful firewall of the 1st Generation of Security Solution, does not achieve a high enough Security posture to mitigate your Risk. Today, we are past our 2nd Generation of Point solution, where "Defense In-Depth" was the trend leading to 20+ individual solutions that gave you the illusion of protection because you had so many, or one solution was a "back-up" for another. Today, with our broad networks (expanded WIFI, SD-WAN, BYOD, IOT), we know that not to be the case. The more complex your Security environment and populated with multiple non-integrated vendor solutions, the more likely for there to be a chink in your protection for a hacker to exploit.

The goal is share with everyone how you can achieve the best ROI by implementing today's 3rd Generation of Security Solution, where internal segments, points of inspection and simplification of point-solutions are key features to the Integrated Security Fabric which all leads to Automation. Thus improving your Security Posture, Simplifying and Reducing the number of Solutions needed, and all why doing this at internal LAN network speeds, because as many Network Admins know, Slow is Broken.

Topics: Information Security
12:00 - 12:45 PM

Current Developments in Cybersecurity Litigation

  Presented by Brad Frazer • IT Lawyer at Hawley Troxell

Despite enterprise use of best IT and security practices, routine deployment of software patches and widespread engagement of consultants and outside experts, hacks still occur—regularly. There appear to be no perfect solutions to enterprise network security, given the breadth of the hackers' skill sets and the value to them of that which they seek: the PII, PHI and IP that resides on your or your cloud host's servers. We have learned through sad experience that the real cost of a hack is in the remediation, which often comes only after the lawyers have gotten involved. Recent hacks have spawned much, much litigation, and there are lessons to be found in those court proceedings. This interactive session will offer a survey of recent data breach/cybersecurity litigation and present best practices that an enterprise CTO, CIO or CISO might take away from those cases.

1:00 - 1:50 PM

Illuminating Behavioral Patterns to Assist Technology for Insider Threats

  Presented by Vanguard Infrastructures & HPE

Today, intellectual property theft is responsible for the greatest transfer of wealth among the countries of the world and frequently involves utilizing the company Insider. The security of the company is every employees' responsibility. Technological innovations in Machine Learning can identify both the human and machine insider threat. In addition, employees must be educated as to what to look for when looking for the Insider Threat. Sensitizing your employees to scenario indicators, elicitation techniques involving behavioral manipulation, and the other principles can create a security force multiplication that will provide greater protection for your company. Vanguard Infrastructures is presenting information and strategies to incorporate the eyes and ears of your employees in the hunt for the insider.

Topics: Information Security
2:00 - 2:50 PM

Innovation and Evolution: BC/DR for Today’s Multi-Cloud Environments

  Presented by Unitrends

We are living in a "Less is More" world. In a landscape that's rapidly changing, IT professionals are managing more work, projects, and risk than ever before. While external threats such as malware and natural disasters cause significant downtime and data loss without proper BCDR implementation, organizations must also be prepared to safeguard from within. Data continues to grow at an exponential rate, and not only on-premises. As cloud-delivered solutions such as IaaS and SaaS are rapidly adopted by an increasing number of organizations, and the workforce itself is becoming increasingly dispersed and mobile, organizations must consider data protection strategies to address gaps in BC/DR outside the traditional data center. Join Adam Marget, Technical Specialist from Unitrends, as we explore the evolving landscape of data protection, cloud’s growing role, BC/DR strategies to safeguard local, remote, and cloud-based workloads, and best practices in planning your DR approach.

Topics: Business Continuity / Disaster Recovery
Max Davis-JohnsonMax Davis-JohnsonCIO, Boise State University
3:00 - 3:50 PM

Ohh La La: I Wish That I Knew What I Know Now When I Was Younger

  Presented by Max Davis-Johnson • CIO at Boise State University

Reflections and speculations on the future of technology and how do we survive, adapt, and even thrive.* With apologies to Rod Stewart and Faces

Max Davis-Johnson has an outstanding record of transformative and innovative leadership in both Higher Education and Industry.

Max is CIO at Boise State University, a position he assumed in 2010. He served previously as Deputy University Technology Officer at Arizona State University for five years and was the Directory of Administrative Computing at Northern Arizona University from 1998 to 2005.

Prior to that, Max worked for 19 years in the Architectural Engineering Construction (AEC) systems industry as a software developer, project manager, consultant, and business developer.

Max is a graduate of the University of Kansas.

  • AM Sessions
  • PM Sessions
9:00 - 9:50 AM

Defense in Diversification: Improving Cybersecurity via Smart Consolidation

  Presented by ExtraHop

Ask any analyst, reporter, or financial observer, and they'll tell you that the security market is ripe for consolidation. For years, security vendors have proliferated, buoyed by high valuations and ever-expanding enterprise security budgets. While this rush to innovate has resulted in better and more sophisticated threat defenses, it has also created a complex web of tools which already overworked, overwhelmed, and understaffed security teams must manage.

This tool sprawl is one reason that so many in and around the security industry believe that an era of consolidation is coming. According to ESG Research, 66 percent of businesses are actively working to consolidate their security portfolio. For many in the security industry, a security platform that essentially puts your "SOC-in-a-box" is an ideal solution to the tool sprawl problem.

But this approach is not without peril. If the security industry consolidates to the point that there are just a few platform solutions, this will not only stifle innovation, it will result in a monoculture — and monocultures are notoriously susceptible to disease. If every organization uses an identical or nearly identical set of security tools, breaking into one means breaking into them all. And once threat actors figure out how to break in once, they'll have the keys to every organization. Just like the world banana population —itself a monoculture — is currently being wiped out by a fungus to which is has no natural resistance, a single cyber threat could take down a vast number of organizations.

Topics: Information Security
10:00 - 10:50 AM

The Current Malware Threat Landscape & Enterprise Grade Remediation

  Presented by Malwarebytes

Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.

This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.

Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.

Topics: Information Security
11:00 - 11:50 AM

Innovation and Evolution: BC/DR for Today’s Multi-Cloud Environments

  Presented by Unitrends

We are living in a "Less is More" world. In a landscape that's rapidly changing, IT professionals are managing more work, projects, and risk than ever before. While external threats such as malware and natural disasters cause significant downtime and data loss without proper BCDR implementation, organizations must also be prepared to safeguard from within. Data continues to grow at an exponential rate, and not only on-premises. As cloud-delivered solutions such as IaaS and SaaS are rapidly adopted by an increasing number of organizations, and the workforce itself is becoming increasingly dispersed and mobile, organizations must consider data protection strategies to address gaps in BC/DR outside the traditional data center. Join Adam Marget, Technical Specialist from Unitrends, as we explore the evolving landscape of data protection, cloud’s growing role, BC/DR strategies to safeguard local, remote, and cloud-based workloads, and best practices in planning your DR approach.

Topics: Business Continuity / Disaster Recovery
1:00 - 1:50 PM

Rethinking Vulnerability Prioritization in the Modern Threat Landscape

  Presented by Tenable, Inc.

When it comes to reducing cyber exposure, an effective vulnerability management approach helps you eliminate blind spots that are often the root of security issues. But with 16,000 vulnerabilities identified in 2018 alone, security leaders know it's not practical to find and fix every vulnerability. Using the Common Vulnerability Scoring System (CVSS) to prioritize is a good start, but it isn't enough to address the complexity of today's attack surface. Security professionals need to be able to reduce the vast universe of potential vulnerabilities down to a subset of the vulnerabilities that are most likely to be exploited in the near-term. Attend this session to learn how adding real-life context to your vulnerabilities can help prioritize vulnerabilities so you can focus your remediation efforts on those that matter most.

Topics: Information Security
2:00 - 2:50 PM

How to Solve the Toughest Challenges in Cloud Security

  Presented by Sophos & Pine Cove Consulting

In an ever-changing, auto-scaling environment, continuous visibility of your public cloud infrastructure is vital. Join Pine Cove Consulting and Sophos Security as we discuss how you can use the power of AI and automation to simplify compliance, governance and security monitoring in the cloud.

Visibility is the foundation on which all public cloud security policies and activities are built. We will discuss how to monitor multiple cloud provider environments including Amazon Web Services (AWS) accounts, Microsoft Azure subscriptions, Google Cloud Platform (GCP) projects, Kubernetes clusters, and development code repositories. With superior visibility, layered with compliance and DevSecOps policies controls and alerts, teams can take control and build on their cloud security strategy with confidence.

Join us to learn how building a complete picture of architecture, including a full inventory and real-time network topology visualization including hosts, networks, user accounts, storage services, containers, and serverless functions, can help you improve your cloud security challenges.

Topics: Information Security
  • AM Sessions
  • PM Sessions
9:00 - 9:50 AM

Architecting the New SD-WAN Edge for the Cloud-first Enterprise

  Presented by Silver Peak

Adoption of cloud services has driven enterprises to re-think WAN architecture. Architectures based on traditional, manually-programmed routers can't keep pace. A business-driven SD-WAN can provide secure direct connections from the branch to SaaS/IaaS across the internet, significantly increasing application performance resulting in a superior end-user QoEx (Quality of Experience). By integrating SD-WAN, WAN optimization, routing and security in a single unified platform, enterprises can simplify branch WAN edge architecture, accelerating time to value and dramatically reducing operational costs. From a centralized SD-WAN orchestrator, application priorities and QoS and security policies may be configured and assigned to automate traffic handling across the WAN. A single mouse click distributes SD-WAN configuration parameters to all sites, improving operational efficiency and minimizing the potential for human errors that can negatively impact application availability and enterprise security. This session will describe why SD-WAN adoption continues at a breakneck pace because of the user productivity, agility and cost savings benefits that a business-driven SD-WAN delivers.

10:00 - 10:50 AM

Don’t Break the Bank to Improve Your Security Posture

  Presented by Idaho Technology Council

The details of this presentation will be available soon. Please check back for updates!

Topics: Business Continuity / Disaster Recovery
11:00 - 11:50 AM

A New Era of Data Protection: Converged DR and Backup

  Presented by Zerto

In today's always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. Being prepared for any data related disaster is key!

  • The cost and business impact of downtime and data loss can be immense
  • Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by software problems and cyber security related disasters
  • Having a plan and process in place will help you mitigate the impact of an outage on your business.

In this presentation we will address the challenges, needs, strategies, and solutions.

Topics: Business Continuity / Disaster Recovery
12:00 - 12:45 PM

My CEO Told Me We Have to Move Our Datacenter to the Public Cloud…So What?

  Presented by Check Point Software

The objective to validate the challenges and threats for datacenter migration and best practices to secure application on the public cloud.

Overcoming public cloud challenges:

  • Shared responsibility is unclear, increasingly sophisticated and automated attacks
  • Lateral spread of threats
  • Account hijacking
  • Inconsistent tools for visibility, management and reporting
1:00 - 1:50 PM

Data Protection: Business Continuity & Disaster Recovery

  Presented by CompuNet

An open panel discussion on Data Protection: Business Continuity & Disaster Recovery. This session will focus on the navigating current trends and best practices in most environments. Bring your tough questions and topics to our engineers who specialize in BCDR.

Topics: Information Security
2:00 - 2:50 PM

Digital to Physical: Real-World Impact of Security Risks in Industries Using IIoT

  Presented by Trend Micro

This presentation will talk about research on radio remote controllers used in industrial settings, and how they can be used for attacks in this environment. This will shed light on how a cyberattack can inflict physical damage or harm. The goal is to inspire the audience to think outside the box in terms of what can be compromised and impose a sense of urgency in the IoT/IIoT security space.

Topics: Information Security
  • AM Sessions
  • PM Sessions
9:00 - 9:50 AM

Threats to Public Cloud Workloads

  Presented by Trend Micro

This presentation will revolve around the various threats workloads are susceptible to as more and more organizations shift from on-premise to the cloud. This will focus primarily on public cloud infrastructure but many of the concepts will apply directly to private cloud/on-prem data center infrastructure as well. The goal of the talk is to give the audience a better understanding of the vulnerabilities associated with cloud workloads and mitigation strategies.

Topics: Information Security
10:00 - 10:50 AM

Emerging Trends in Cybersecurity

  Presented by Trace3

As the threat landscape rapidly expands, enterprises across all industries are seeking approaches and technologies to safeguard their interest from advanced and persistent threats. Mounting regulatory and financial penalties against a talent shortage, the need for better cybersecurity only becomes more apparent.

Startups are emerging to offer solutions that address vulnerabilities arising from the growing threat vectors introduced by the expansion of the enterprise domain. Understanding trends and technologies that are driving the future of cybersecurity is critical to both individual contributors and leaders.

Topics: Information Security
11:00 - 11:50 AM

Identity is the New Perimeter

  Presented by Alchemy Technology Group

Data breaches continue to dominate mainstream media, impacting millions of consumers and costing millions of dollars for the liable parties. With the acceleration of Cloud Computing and Software as a Service (SaaS) platforms, the Cyber Security world has evolved from vandalism, to theft, and now all-out war. The bad actors have become extremely creative in compromising credentials to impersonate users, infiltrate environments, and collect confidential data. The value proposition of "anytime, anywhere, any device" access sounds great in principal, but often presents extreme risk in practice. A formal identity strategy provides a backdrop to extend corporate policy well beyond the walls of the corporate office, offering flexibility to embrace evolving technology without compromising security posture. In this session Alchemy Technology Group will outline 10 principles for a successful Cyber Security strategy, with a focus on identity's role as the new perimeter.

Topics: Information Security
1:00 - 1:50 PM

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today's businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Topics: Information Security
2:00 - 2:50 PM

Exploitation of IT Vulnerabilities is Escalating

  Presented by Quest Software

Cybercriminals are savvier than ever. They understand that IT complexities create serious vulnerabilities, and these criminals are continually developing new ways to breach your organization's boundaries. That is why a proactive, unified endpoint management (UEM) strategy should be part of your organization's core business strategy.

Topics: Information Security, Strategic Management

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Patrick  Abernathy
Director, Information Technology
Jacksons Food Stores

Dan Bond
Manager, IS Systems Engineering
Boise Inc

Laurel  Caldwell
IT Manager
Latah County

Mark  Cecil
Pacific District Director, End User Systems
U.S. Department of Veterans Affairs

Brandon  Cheyney
Info. Technology Manager
City of Nampa

Rody  Cummings
IT Director
Western Power Sports, Inc

Brian  Currin
IT Operations Manager
Boise School District

Herman  Doering
System Info. Security Officer
St. Luke’s Health System

Bob  Duker
Director of Services
Advotech IT Consulting

Kenneth Duran
Computer Specialist
US Bureau of Reclamation

David  Egbert
IT Manager
Paperclip Systems

Brad  Frazer
Partner
Hawley Troxell

Matt  Fuhrman
Information Security Officer
Your Health Idaho

Frank Goble
Director, Information Security
Malheur County

Patti  Henderson
IT Director
Givens Pursley

Michael  Heywood
Information Security Officer
Blue Cross of Idaho

Laura  Hill
Branch Chief, Info. Technology
US Forest Service

Jerry  Hindberg
Assc. Director, Network Support Svc
Lewis-Clark State College

Mary  Howard
Director, Information Technology
Shoshone-Paiute Tribes

Jason Jacobson
Chief Information Officer
Futura Title& Escrow Group

Kelvin James
Data Center Manager
Central Garden & Pet

Michael  Kalm
Chief Security/Technology Officer Information Technology
Idaho Department of Labor

Scott  Knights
Sr. Information Security Officer
Idaho Dept of Health and Welfare

Randy LaPorte
Systems Engineer
Sunwest Bank

Jay  Larsen
President and CEO
Idaho Tech Council

Ken  Malach
President
CRI Advantage

Jared  Mattravers
Manager, IT Data Center
St. Luke’s Health System

Gary Mountain
Director of IT Operations
Winco Foods, LLC

Rick  O’Donnell
Supervisor, Information Technology
Keller Associates

Doug  Ooley
Director of ITGRC/Cybersecurity
Boise State University

Terrance  Patternoster
Manager, Information Systems
Hawley Troxell

Raul Pena
IT Manager
Payette County

Misty Perry
Administrator, Information Records
Ada County Hwy District

Andrew  Peterson
Information Security Officer
US Dept of Veterans Affairs

Morgan  Poyser
Information Systems Manager
Preco Electronics

Adam  Reno
IT Infrastructure Services Manager
City of Boise

Danny  Rowell
Program Manager
Rampart Research

Michael  Rowell
VP, Information Technology
Turn-Key Medical, Inc.

John  Sacchi
Manager, Information Securtity
CSHQA

Lisa  Schoenfelder
Enterprise Project Manager
City of Boise

Marlin  Snyder
Director, Information Technology
Beef Northwest Feeders

Jon  Spence
IT Network Analyst
Idaho State Liquor Division

Larry  Sweat
IT Manager
PERSI

Bob  Tanabe
Manager, Voice Networks
Boise Inc

Dawn Teply
IT Security Analyst
St. Luke’s Health System

Mark  Thayer
Director, information Systems
Melba School District

Devin Throngard
Manager, Information Technology
Hawkins Companies LLC.

Dave Tiede
CIO
City of Meridian

JR Tietsort
Chief Information Security Officer
Micon Technology

Fred  Warr
Business Systems Director
Boise State University

David Wentland
IT Resource Manager
Idaho State Tax Commission

Paula Williams
IT Quality & Compliance Manager
Idaho Power

Kristopher Wilson
Program Manager
Anderson & Wood Construction

Scott  Wilson
Manager, Information Technology
Integrated Technologies

Rachel  Zahn
Security Operations Lead
Micon Technology

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

CompuNet

CompuNet

CompuNet
CompuNet is a leading U.S. information technology partner, headquartered in Boise, Idaho. The firm specializes in consultation, design and implementation services specifically tailored to solve business problems. With a best-in-class engineering staff and approach, CompuNet focuses on building lasting relationships that prioritize client satisfaction over sales through every step of the journey.
Visit Website
Trend Micro

Trend Micro

Trend Micro
Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information.
Visit Website
Unitrends

Unitrends

Unitrends
Unitrends is trusted by IT leaders worldwide who know that in today's digital world protecting their ideas and keeping their business running is non-negotiable. The company’s Connected Continuity Platform protects virtual, physical, + cloud based systems.
Visit Website
Vanguard Infrastructures

Vanguard Infrastructures

Vanguard Infrastructures
Vanguard Infrastructures provides customers with targeted solutions for today’s complex, changing cyber threat environment. We help companies prevent, detect, and understand threats to their organizations with powerful ML and AI cybersecurity solutions.
Visit Website

SILVER SPONSORS

Alchemy Technology Group

Alchemy Technology Group

Alchemy Technology Group
We at Alchemy understand that the balance of supporting your needs in a secure and cost-effective manner is paramount. Our goal is to understand your business and present meaningful solutions to be a truly transformative partner.
Visit Website
Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
ExtraHop

ExtraHop

ExtraHop
ExtraHop delivers enterprise cyber analytics that allow you to quickly investigate threats, ensure the delivery of critical applications, and secure your investment in the cloud.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet helps organizations across the public and private sectors protect the systems, data, and services that keep businesses and communities running. From government agencies and schools to enterprises and service providers, leaders rely on Fortinet to secure critical infrastructure, ensure operational continuity, and defend against evolving cyber threats. Our Security Fabric platform unifies networking and security to deliver the visibility, control, and efficiency organizations need to operate confidently, whether virtual, in the cloud, or on-premises.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
Malwarebytes

Malwarebytes

Malwarebytes
Malwarebytes protects workplace productivity. We secure all your endpoints so employees can connect confidently, from anywhere. We combine analytics-driven, multi-layer threat protection and industry-leading incident response to both simplify and strengthen overall cybersecurity. You and your team stay up and running, so you can remain focused on driving your business.
Visit Website
Quest Software

Quest Software

Quest Software
At Quest, we solve complex problems with simple solutions. Our philosophy is focused on great products, great service and being simple to do business with. We deliver technology that eliminates the need to choose between efficiency and effectiveness.
Visit Website
Silver Peak

Silver Peak

Silver Peak
Silver Peak, recently acquired by HPE Aruba, delivers networking software that powers a self-driving wide area network (SD_WAN) that learns and adapts to requirements of the business to ensure the highest levels of end user and application performance.
Visit Website
Sophos

Sophos

Sophos
Sophos Security's synchronized security approach enables organizations to secure their organization with a suite of products and services designed to tackle the zero-day threats of today and the future.
Visit Website
Tenable

Tenable

Tenable
Tenable, Inc., is the Cyber Exposure company. Over 30,000 organizations around the globe rely on Tenable to understand and reduce cyber risk.
Visit Website
Trace3

Trace3

Trace3
Trace3 is a full-service systems integrator, focused on business transformation through the deployment of innovative solutions. We offer solutions across the infrastructure spectrum (compute/network/storage/virtualization/cloud/security/data intelligence) which includes hardware, software, and professional services.
Visit Website

BRONZE SPONSORS

Allstream

Allstream

Allstream
Allstream is a business communications provider in Canada and the United States. Allstream’s customers benefit from access to an expansive network of experts and a team focused on reliability & customer experience. Our services include voice, collaboration, and connectivity solutions.
Visit Website
Cerium Networks

Cerium Networks

Cerium Networks
Cerium is a recognized innovator and leading provider of a full suite of collaboration, contact center, networking, data center, and security solutions. We help medium to large businesses in the Northwest plan for and then realize the positive impact of technology on their business operations, strategies, and user experiences.
Visit Website
Gigamon

Gigamon

Gigamon
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.
Visit Website
IGEL Technology

IGEL Technology

IGEL Technology
IGEL provides next-gen edge OS endpoint security, optimization, and control solutions for cloud workspaces and virtual desktops.
Visit Website
Neurilink

Neurilink

Neurilink
At Neurilink, we create reliable and easy-to-use workplace AV solutions that restore productivity and reinforce your company's professional image. Get a quote for your meeting rooms, training rooms, auditorium and shared spaces.
Visit Website
Proofpoint

Proofpoint

Proofpoint
Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.
Visit Website
Tek-Hut

Tek-Hut

Tek-Hut
Tek-Hut, Inc specializes in comprehensive design and construction of IT infrastructure for education, local and state government customers. Services: Cloud, Voice, Data Center, Managed IT and E-Rate Solutions.
Visit Website
ValorC3

ValorC3

ValorC3
ValorC3 is a modern data center, cloud and connectivity partner that delivers agile, scalable IT solutions tailored to the relentless mid-market enterprise. Valor meets clients where they’re at and gets them where they need to grow, helping them navigate the rapidly changing digital landscape with flexible, high-density data centers, extensive infrastructure expansion capabilities, low latency networks, strong partnerships and decades of industry expertise.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website

EXHIBITORS & ASSOCIATIONS

Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
ByteSpeed

ByteSpeed

ByteSpeed
ByteSpeed has been providing IT Solutions, including custom built hardware, networking solutions, and professional IT services in all 50 states in the US since 1999. https://bytespeed.com/
Visit Website
Citrix

Citrix

Citrix
Citrix Systems is the global leader and the most trusted name in application delivery infrastructure. More than 200,000 organizations worldwide rely on Citrix to deliver applications with the best performance, highest security and lowest cost.
Visit Website
Commvault

Commvault

Commvault
Commvault is a worldwide leader in delivering data readiness. Commvault's backup and recovery software enables you to protect, manage, and use your data, while managing it in a consistent, compliant way.
Visit Website
Cymatic Security

Cymatic Security

Cymatic Security
Cymatic delivers the only user and entity behavior analytics (UEBA) platform that autonomously identifies and verifies a user’s security hygiene pre-endpoint and blocks any threats before they get past the browser. Delivered through a zero-agent snippet that installs in seconds, highly regulated organizations that provide web applications rely on Cymatic for real-time visibility into user and visitor behavior to detect risk, mitigate threats and enforce security hygiene.
Visit Website
DuraLine

DuraLine

DuraLine
Visit Website
Everpure

Everpure

Everpure
Create an Enterprise Data Cloud that unifies access, simplifies management, and unlocks the value of your data—only with the Everpure platform.
Visit Website
F5 Networks

F5 Networks

F5 Networks
F5 provides solutions for an application world. F5 helps organizations seamlessly scale cloud, data center, telecommunications, and software defined networking deployments to successfully deliver applications and services to anyone,anywhere, at any time.
Visit Website
Green House Data

Green House Data

Green House Data
Green House Data is a platform agnostic managed services provider who delivers hybrid solutions to enterprises who need secure IT environments and efficient management of their critical applications and business data. The company is a certified B-Corp.
Visit Website
HPE

HPE

HPE
At Hewlett Packard Enterprise, we aim to be the industry’s leading provider of hybrid IT, built on the secure, next-generation, software-defined infrastructure that will run customers’ data centers today, bridge them to multi-cloud environments tomorrow, and power the emerging intelligent edge that will run campus, branch and Industrial IoT applications for decades to come. All delivered through a world class services capability.
Visit Website
HPE Juniper Networking

HPE Juniper Networking

HPE Juniper Networking
Juniper Networks is now part of HPE. Together, we're building industry-leading, secure, AI-native networks – purpose-built with and for AI. As AI and networking converge, we're driving a bold transformation across enterprises, service providers, and cloud operators.
Visit Website
Idaho Technology Council

Idaho Technology Council

Idaho Technology Council
The mission of the Idaho Technology Council is to help technology companies in Idaho start, grow, and thrive. We are a member-driven organization committed to the success of Idaho’s technology ecosystem.
Visit Website
Infoblox

Infoblox

Infoblox
Infoblox unites networking and security to deliver unmatched performance and protection. Trusted by Fortune 100 companies and emerging innovators, we provide real-time visibility and control over who and what connects to your network, so your organization runs faster and stops threats earlier.
Visit Website
ISACA Boise

ISACA Boise

ISACA Boise
With more than 100,000 members in more than 180 countries, ISACA (www.isaca.org) is a recognized worldwide leader in IT governance, control, security and assurance.
Visit Website
ISSA Boise

ISSA Boise

ISSA Boise
The primary goal of the Information Systems Security Association, Inc. (ISSA) is to promote management practices that will ensure the confidentiality, integrity and availability of organizational information resources.
Visit Website
Ixia

Ixia

Ixia
Ixia delivers a powerful combination of innovative solutions and trusted insight to support your network and security products. Ixia offers an extensive array of solutions in testing, visibility, and security. For more information visit www.ixiacom.com.
Visit Website
Nutanix

Nutanix

Nutanix
Nutanix makes IT infrastructure invisible with an enterprise cloud platform that delivers the agility and economics of the public cloud, without sacrificing the security and control of on-premises infrastructure.
Visit Website
Okta

Okta

Okta
Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology— anywhere, on any device or app. Organizations trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, government, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations.
Visit Website
ONE IDENTITY

ONE IDENTITY

ONE IDENTITY
One Identity portfolio of identity governance, access management, privileged management and identity as a service solutions, helps organizations optimize identity and access management (IAM).For more info, visit http://www.oneidentity.com.#GetIAMRight
Visit Website
OpenGear

OpenGear

OpenGear
Opengear delivers secure, resilient access to critical IT infrastructure, even when the primary network is down. Smart Out-of-Band provides remote management, provisioning, and orchestration of network devices through innovative software and appliances.
Visit Website
Pine Cove Consulting

Pine Cove Consulting

Pine Cove Consulting
Pine Cove Consulting has serviced educational institutions, government agencies, and businesses across the Rocky Mountain Region since 1993. Pine Cove is a Sophos Platinum Partner and offers a suite of cybersecurity products to protect your organization.
Visit Website
RedSeal

RedSeal

RedSeal
RedSeal’s cyber risk modeling solution unifies public cloud, private cloud and physical network environments into one, interactive model. RedSeal is at the forefront of building Digital Resilience into organizations with robust cyber risk modeling.
Visit Website
Right! Systems

Right! Systems

Right! Systems
Right! Systems, Inc. is an IT management services company that provides business-driven, multi-vendor IT solutions in Network Infrastructure, Virtualization, Storage, Unified Communications, Telepresence, Security, Mobility and Professional Services.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website
Ruckus Networks

Ruckus Networks

Ruckus Networks
Ruckus Networks is redefining connectivity around the globe. We build secure wired and wireless access networks for organizations that place a premium on connectivity experiences for end-users as well as simplicity and lower-cost-per-connection for IT.
Visit Website
SHI

SHI

SHI
From designing cloud, data center and end user computing strategies that support your hybrid working model to delivering the hardware and software you need to run it, SHI is your complete IT partner.
Visit Website
Skybox Security

Skybox Security

Skybox Security
Skybox arms security teams with a powerful set of security management solutions that extract insight from security data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address vulnerabilities and threat exposures.
Visit Website
StarLeaf

StarLeaf

StarLeaf
StarLeaf is a global cloud communications/collaboration provider & manufacturer of premium meeting room solutions. StarLeaf focuses on security (ISO-27001 Certified), reliability (99.999% uptime SLA), ease-of-use, & interoperability with other platforms.
Visit Website
Syringa Networks

Syringa Networks

Syringa Networks
Syringa Networks is an industry-leading Managed Network Service Provider. We specialize in dedicated Internet, Voice, SD-WAN, Colocation, and Security. As a local provider, with more than 2,000 miles of fiber​, we deliver quick installs and access to live customer support, 24/7.
Visit Website

Interested in becoming part of our next Boise event?

CONTACT US FOR INFO

Boise

Boise Centre
Grand Ballroom 100
850 W. Front Street
Boise, ID 83702

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.