F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Virtual Boise 2021 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

September 2nd, 2021
8:30am – 4:30 PM

Virtual Conference
Multi-track seminars with Q&A
1-on-1 chat and networking
Hourly prize drawings

KEYNOTE: [1 CPE] The Office Rethought: Considerations on the Modern Work Environment

  Presented by Mark Fitzgerald • Executive Director of Customer Care, Boise State University

Seminar Schedule

  • Theater One
  • Theater Two
  • Theater Three
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Ransomware Resilience: Best Practices to Prepare, Mitigate, and Recover

  Presented by Zerto

Large organizations are still being forced to pay ransoms due to ransomware attacks. Disruptions to services and supply chains are putting ransomware victims in the news under a negative spotlight. Join recovery and resilience experts from Zerto to discuss best practices to minimize downtime and avoid paying ransoms by being prepared. In this session, you’ll learn:

  • Ransomware 101: A breakdown of a ransomware attack and how it affects systems
  • What steps you can take to reduce the likelihood of attacks on your system
  • How to best choose a recovery solution for ransomware
  • How you can best harden your recovery systems against attacks
  • How to create a recovery plan to react and recovery quickly
  • How a company hit twice by ransomware improved recovery time from weeks to minutes by planning ahead
Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Zero Trust: From Theory to Reality in Five Steps

  Presented by Guardicore

Let’s be real. True to its name, there is zero trust about the term “zero trust.” It’s been used as marketecture since its inception. Cut through the fog with this presentation with practical insight and steps to take to ensure your organization makes the most out of ZTA.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Leveraging Assessment Findings to Harden Your Security Perimeter

  Presented by Fortinet

Are you regularly evaluating your network security?

Performing assessments is a tried-and-true method for improving your security posture, but they can be a daunting task for network security staff who are often short on manpower, expertise, and/or time. Regardless, the benefits of running assessments almost always outweigh any potential drawbacks. Having a security assessment in hand will increase your security situational awareness and significantly impact your organization’s risk preparedness and mitigation.

Join us as we discuss the importance of periodically validating your existing security controls and provide learnings and best practices from our experts.

Topics: Information Security
12:00 - 12:50 PM

[1 CPE] Best Practices for Dealing with the Increasing Costs of a Cyber Event

  Presented by Bradlee Frazer Esquire • Partner, Hawley Troxell

Lawyers and insurance agents are busier than ever dealing with cyber events, hacks, and data breaches! Why are such attacks increasing despite all the systemic countermeasures, consultants, and classes? What are some best practices to think defensively and prepare financially and legally for such an event?

BIO:

Bradlee Frazer is a partner with Hawley Troxell where he chairs the firm’s Internet and Intellectual Property Practice Group. In addition to emphasizing and focusing on all facets of Internet law, Intellectual Property law, and Information Technology law, he also helps clients with related transactional work and litigation.

Brad is a published novelist and has written extensively for national legal publications and law blogs. He is a frequent speaker on internet, intellectual property, and computer law topics and is a regular guest lecturer at Boise State University on those subjects.

A Boise native, Brad began his legal career in 1989 as an intellectual property attorney and commercial litigator at a Boise-based law firm. In 1997 he accepted an in-house position as Senior Intellectual Property Counsel with Fortune 1000 company, Micron Electronics, Inc., and remained there through the company’s merger with Interland, Inc. (now Web.com), then the nation’s largest Web hosting company. He eventually became Deputy General Counsel for Micron Electronics, Inc., and Interland, Inc. From June 2003 to February 2006, Mr. Frazer served as Deputy General Counsel to MPC Computers, LLC, in Nampa, Idaho.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Are You Prepared? A Discussion on Backups and Security

  Presented by INTERFACE Advisory Council

Since the start of the pandemic, your workflow and office structure have shifted tremendously. The way any firm operates now has adapted to the change in remote workers. While many moves have been made to allow workers to remain efficient, have you kept up with the new security threats? Having a good DR plan is always paramount. Have you tested your plan since the pandemic began?

Join the INTERFACE Advisory Council for an open discussion about these items and more. How does your BC/DR plan need to evolve now? Will your company have a large amount of staff permanently working remotely? We will discuss what controls you need to change, managing secure access, and handling a rise in security threats.

Panelists:
Peter Jurhs • Executive Director, Operations, Nampa School District
Tory Jamison • Executive Director, Cloud Services & Infrastructure, Boise State University
Jerry Hindberg • Assoc Director, Network & Cybersecurity, Lewis-Clark State College
John Stiffler • Director, Corporate IT, Boise Cascade Company

Topics: Business Continuity / Disaster Recovery, Information Security
2:00 - 2:50 PM

[1 CPE] Discover How SD-WAN Edge and Cloud Security are Enabling Digital Transformation

  Presented by Silver Peak & Aruba, a HPE Company

Adoption of cloud services and the explosive increase in mobile and IoT devices have driven enterprises to transform both their WAN and security architectures – not just one or the other. The strategic imperative is to deploy a more intelligent, highly automated software-defined wide area network (WAN) that can be seamlessly integrated with modern cloud-delivered security services. Gartner coined the term “secure access service edge” (SASE) to describe this cloud-first architecture. During this session, Aruba and Silver Peak will discuss:

  • SD-WAN and security considerations enterprises must address when migrating to a SASE architecture
  • How to address Zero Trust access security requirements for remote workers and IoT
  • Pros and cons of single vendor vs multi-vendor SASE implementations
Topics: Data Storage, Infrastructure
Mark FitzgeraldMark FitzgeraldExecutive Director of Customer Care, Boise State University
3:00 - 3:50 PM

[1 CPE] The Office Rethought: Considerations on the Modern Work Environment

  Presented by Mark Fitzgerald • Executive Director of Customer Care, Boise State University

The events of the past year have accelerated conversations between the business and employees about what it means to be flexible. Whether it be schedule, location, amenities, or technologies, employees are seeking what they want and when and where they want it. This has led to a host of issues for technologists to consider, create process and policy around, as well as support.

Industries all over will have a remote workforce for the foreseeable future. Technology has led this transition and will continue to do so. IT professionals need to have a voice in these policy decisions. Spending needs to be reprioritized to accommodate these changes. Come and gather to discuss and share some of the challenges in supporting a hybrid work environment.

Mark Fitzgerald has a passion for education and has been working in higher education for over twenty-five years. He has presented at dozens of conferences as well as having had the opportunity to be an international keynote speaker. Mark is the Executive Director of Customer Care at Boise State University and is also an adjunct professor in the College of Business and Economics. He has presented all over the world at HDI conferences, local chapter meetings, and HDI Higher Education Forum meetings. He has chaired organizations such as the Higher Education Forum and the HDI Desktop Support Advisory Board.

Topics: Strategic Management
  • Sessions
9:00 - 9:50 AM

[1 CPE] What Got Us Here, Won’t Get Us to Where We’re Going…

  Presented by Aruba, a HPE Company

Over the past couple of decades, we’ve relied on a certain predictable and repeatable model of expectations from our infrastructure that has delivered. However, the demands of Digital Transformation, the pace of change, the capabilities within our teams -- and of course the pandemic -- have created business pressures that traditional ways of building and security infrastructure just can’t keep pace with.

The time is now to reflect, reset, and embrace a different way that will increase agility and flexibility as well as enhance performance and security. Lose the baggage of the past, travel light, and let’s chart a course for the journey ahead.

Topics: Business Continuity / Disaster Recovery, Information Security, Infrastructure
10:00 - 10:50 AM

[1 CPE] The Evolution of Physical Security

  Presented by Pine Cove Consulting & Verkada

Physical security is evolving. Security cameras can now store footage locally without NVRs or DVRs. Advanced filtering allows you to quickly find the footage you are looking for. Sharing access to live camera feeds can now be done simply via a link or SMS. Managing system health and providing using permissions is easier than ever. Access control can now integrate seamlessly into your security camera system to provide an added layer of security with real-time visibility.

Join Verkada and its preferred partner, Pine Cove Consulting, for a deep dive into the evolution of physical security systems and the transition to cloud-based physical security.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] CI/CD for Networking: Adopting DevOps Principles for a More Robust Network

  Presented by Infoblox

In recent years, continuous integration and continuous deployment, aka CI/CD, have become de facto standards for DevOps-minded software development organizations. Adoption of CI/CD enables software architects and IT specialists to create more flexible, secure and agile infrastructure with new features and functionality that are continually improved and deployed. While compute and storage aspects of environments have benefited greatly from CI/CD, network infrastructure has lagged behind.

This presentation pulls back the covers on efforts taking place to bring CI/CD philosophies to the work of revamping legacy, monolithic network architectures using cloud-native principles, microservices and containerization. The end goal is to create networks that are inherently more adaptable, scalable, automated and simpler to manage.

Speaker Bio: Glenn Sullivan is a Principal Product Manager for Emerging Technologies at Infoblox and joined the Infoblox team when SnapRoute, a company he co-founded in 2015, was acquired by Infoblox. At SnapRoute, Sullivan was responsible for product direction by advocating for the end-user. Prior to founding SnapRoute, Sullivan was responsible for building out hyperscale data center environments at Apple. In addition to core network operational functions, Sullivan led efforts to automate the lifecycle management of various platforms in a multivendor environment. Before Apple, Sullivan was a specialist support engineer on the LAN Switching team in Cisco TAC. While there, his specialty was in turning around customer sentiment by focusing on escalated issues and transforming the customer experience into a positive one. Sullivan has a BS in Network and Systems Administration from RIT (Rochester Institute of Technology).

Topics: Infrastructure, Unified Communications
12:00 - 12:50 PM

[1 CPE] Cybersecurity Resilience Through Public-Private Partnerships

  Presented by Josh Stemp • Cybersecurity Advisor, CISA

What do I do? Is this beyond my scope of expertise? Where can I get guidance?

These are questions that Cybersecurity professionals ask themselves every day. You may spend your days thinking you are alone; you are not. Join Joshua Stemp to learn how public-private partnerships can strengthen an organization’s cybersecurity posture. He will outline what the Cybersecurity and Infrastructure Security Agency (CISA) is doing to secure the nation from the never- ending barrage of cyber threats.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] 2021 State of Malware

  Presented by Malwarebytes

Over the past year, the tools and tactics of cybercrime and cybersecurity adapted against a backdrop of enormous changes to our lives and businesses.

Join us to learn how cybercrime evolved in 2020 and identify ways to safeguard your organization against what’s out there.

We’ll explore:

  • Top threats for businesses and consumers
  • Emerging cybercrime trends and tactics
  • Solutions you can employ to thwart future attacks
Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Cybersecurity Maturity Model Certification: Considerations for Compliance

  Presented by Matanuska Telephone Association

Everything You Need to Know About CMMC:

In 2007, Chinese hackers successfully targeted a Department of Defense (DoD) subcontractor leading to the creation of a powerful fighter jet. During this cyberattack, the Chinese stole enough data to make their J-20 stealth fighter jet a real threat to the USA. The reality of this attack is that it wasn’t just a one-off event—over $600 billion is lost globally due to cyber theft every year. With that in mind, the DoD knew something needed to change.

Changes to cybersecurity compliance are coming. Before the introduction of the cybersecurity maturity model certification (CMMC), any self-attesting defense contractors could say that they were compliant with specific cybersecurity guidelines—without having to prove it. This not only left room for contractors to become complacent but diminished all compliant defense contractors’ credibility. In short, contractors who were reckless with sensitive information weren’t held accountable—until now.

With the rollout of the CMMC, contracting with the DoD is more specialized than ever—especially if you’re dealing with controlled unclassified information (CUI). But these new guidelines also mean the space will become more lucrative. It’s estimated that 129,810 businesses will likely pursue CMMC certification in the first 5 years.

CMMC boils down to 3 major points:

  1. It’s mandatory. All CMMC requirements will explicitly address what level your company needs to be at to send or receive any future federal agency RFIs and RFPs.
  2. It’s verifiable. Proof of certification will be accessible electronically.
  3. It’s a long-term investment. Many organizations see between 12-18 months of continual effort to complete their compliance projects fully.

Presented by Rob Thurston, Chief Technology Officer at Ampersand, Alaska’s leading technology services provider, attendees will learn about compliance requirements, sustainability, and risks for DoD contractors.

Topics: Business Continuity / Disaster Recovery, Strategic Management
  • Sessions
9:00 - 9:50 AM

[1 CPE] Building a Response Strategy to Advanced Threats

  Presented by ExtraHop Networks

The SolarWinds SUNBURST attack was a rude awakening for many security teams, and it won't be the last time Security leaders face tough questions about how an adversary evaded defenses and stayed hidden. With threats persisting inside the network for months, security teams need a new plan. In this session, CISO Jeff Costlow discusses strategies, including revising existing mental models and incident response processes, to build resilience in the fight against advanced threats.

Topics: Business Continuity / Disaster Recovery, Information Security
10:00 - 10:50 AM

[1 CPE] Data Protection Predictions for 2021

  Presented by Druva

Phil Goodwin, Research Director at IDC, joins W. Curtis Preston, Druva's Chief Technical Evangelist, for a discussion on key trends and developments expected from the world of cloud data backup and prediction in 2021.

Curtis Preston is an expert in backup & recovery systems; a space he has been working in since 1993. He has written four books on the subject, the fourth of which is Modern Data Protection from O'Reilly. It was published in May 2021. He is the host of the Restore It All podcast, and the founder and webmaster of backupcentral.com, a website dedicated to backup and recovery.

Topics: Data Center Technology, Infrastructure
11:00 - 11:50 AM

[1 CPE] Secure Connectivity, Delivered in the Cloud

  Presented by Optiv Security & iboss

Come learn what SASE (Secure Access Service Edge) is and understand the decisions you’ll need to make as you map out your own SASE journey.

In this session you’ll learn:

  • What is driving almost every company to consider SASE?
  • What decisions are being considered by Networking and Security teams?
  • What services can you replace with SASE?
  • Architecture matters! What are my options?
  • How do I migrate to SASE with zero downtime?
Topics: Data Storage, Information Security
1:00 - 1:50 PM

[1 CPE] Protect Your Applications and Data from Ransomware Threats

  Presented by Airgap Networks

Typical enterprise attack surface has dramatically increased post COVID19. Employees, contractors, and vendors have access to enterprise crown jewels over legacy and insecure VPN technology for their respective home environments. It is no wonder that we are witnessing a rapid increase in cybercrimes in the last 18 months. Is protecting your application and data your top priority? If so, please join us in the session to understand the threat landscape and various technology options to safeguard your assets.

We believe the fundamental issues faced by the organizations relate to excessive trust relationships over VLANs and VPNs. For better security, we must ensure that every transaction is authorized and authenticated, and we must make this happen without the need for a bunch of legwork.

Join us and learn more about our point of view on how you can protect your assets without forklift upgrades. Ritesh Agrawal, Co-Founder and CEO of Airgap Networks, will discuss industry leadership and provide a technology overview, addressing the following:

  • How does the modern Application Access approach compare to the traditional remote access VPN?
  • What’s the best method to deploy and operate Universal Secure Access Solution?
  • How to apply zero trust principles, especially for legacy protocols such as SSH, SMB, WMI, RDP, etc.?
  • What’s the importance of SSO/MFA authentication coupled with intent check?
  • Walkthrough (Demo) real-world use cases across private and public sectors.

Enjoy the INTERFACE event and we look forward to meeting you at the (virtual) booth.

Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Lorraine Bessmer
Manager, Cybersecurity
St Luke’s Health System

Dan Bond
Manager, Information Technology
Boise Cascade Company

Laurel Caldwell
Director, IT Services
ID Latah County

Brandon Cheyney
Systems Administrator
ID City of Nampa

Russ Cunningham
Manager, IT Security
ON Semiconductor

Herman Doering
HIPAA Information Security Officer
St Luke’s Health System

Matt Fuhrman
Manager, Information Security & Privacy
Your Health Idaho

Steve Goff
Director, Information Technology
Northwest Lineman College

Devonte Goodman
Director, Information Technology
ID City of Eagle

Patti Henderson
Director, Information Technology
Givens Pursley LLP

Jerry Hindberg
Associate Director, Network & Cybersecurity
Lewis-Clark State College

Mary Howard
Computer Systems Administrator
Shoshone-Paiute Tribes

Johanthen Inskeep
Chief Information Officer
Caribou Memorial Hospital

Scott Knights
Chief Information Security Officer
ID Dept of Health & Welfare

Jenne Lacey
Director, Information Technology
ID Clearwater County

Daniel Monighetti
Manager, IT Services
Advanced Health Services LLC

Raul Peña
Manager, Information Technology
ID Payette County

Misty Perry
Information Records Administrator
Ada County Highway District

Andrew Peterson
Manager, Information Systems Security
US Dept of Veterans Affairs

Jason Povey
Chief Information Officer
Power County Hospital District

Morgan Poyser
Manager, Information Systems
Preco Electronics

Cody Shepherd
Sr Manager, IT Operations
Idaho Power Company

Mike Slotemaker
Director, IT Operations
Western Power Sports

Jon Spence
Deputy Director, IT & Security
ID State Liquor Division

Michael Stanton
Manager, Information Technology
Ada County Highway District

John Stiffler
Director, Corporate IT
Boise Cascade Company

Bob Tanabe
Manager, Support
Boise Cascade Company

Fred Warr
Manager, OIT
Boise State University

Brian Weissinger
Manager, Information Technology
Idaho Power Company

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website

SILVER SPONSORS

Airgap

Airgap

Airgap
Airgap's Agentless Zero Trust Isolation™ platform is the best defense against ransomware propagation. Put an end to threat propagation and protect your infrastructure - in minutes, not months.
Visit Website
Druva

Druva

Druva
Druva™️ delivers data protection & management for the cloud era. Druva Cloud Platform is built on AWS & offered as-a-Service & drives down costs by up to 50 percent, delivering globally accessible, scalable & autonomous enterprise data resiliency.
Visit Website
ExtraHop

ExtraHop

ExtraHop
ExtraHop delivers enterprise cyber analytics that allow you to quickly investigate threats, ensure the delivery of critical applications, and secure your investment in the cloud.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet helps organizations across the public and private sectors protect the systems, data, and services that keep businesses and communities running. From government agencies and schools to enterprises and service providers, leaders rely on Fortinet to secure critical infrastructure, ensure operational continuity, and defend against evolving cyber threats. Our Security Fabric platform unifies networking and security to deliver the visibility, control, and efficiency organizations need to operate confidently, whether virtual, in the cloud, or on-premises.
Visit Website
Guardicore

Guardicore

Guardicore
Guardicore, now part of Akamai, delivers easy-to-use Zero Trust network segmentation to security practitioners across the globe. Our mission is to minimize the effects of high-impact breaches, like ransomware, while protecting the critical assets at the heart of your network. We shut down adversarial lateral movement, fast. From bare metal to virtual machines and containers, Guardicore has you covered across your endpoints, data centers and the cloud. Our software-based platform helps you become more secure to enable your organization’s digital transformation.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
iboss

iboss

iboss
iboss is a cloud security company that provides organizations and their employees fast and secure access to the Internet on any device, from any location, in the cloud.
Visit Website
Infoblox

Infoblox

Infoblox
Infoblox unites networking and security to deliver unmatched performance and protection. Trusted by Fortune 100 companies and emerging innovators, we provide real-time visibility and control over who and what connects to your network, so your organization runs faster and stops threats earlier.
Visit Website
Malwarebytes

Malwarebytes

Malwarebytes
Malwarebytes protects workplace productivity. We secure all your endpoints so employees can connect confidently, from anywhere. We combine analytics-driven, multi-layer threat protection and industry-leading incident response to both simplify and strengthen overall cybersecurity. You and your team stay up and running, so you can remain focused on driving your business.
Visit Website
MTA

MTA

MTA
MTA was established in 1953 as a locally owned and operated Alaskan co-op and built the state’s first and only all-terrestrial network. Ampersand (an MTA subsidiary) is the leading technology services provider delivering hybrid cloud hosting solutions, cybersecurity & risk management, and more.
Visit Website
Optiv

Optiv

Optiv
Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential.
Visit Website
Pine Cove Consulting

Pine Cove Consulting

Pine Cove Consulting
Pine Cove Consulting has serviced educational institutions, government agencies, and businesses across the Rocky Mountain Region since 1993. Pine Cove is a Sophos Platinum Partner and offers a suite of cybersecurity products to protect your organization.
Visit Website

BRONZE SPONSORS

Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
Matrix42

Matrix42

Matrix42
Matrix42 simplifies and secures your digital workspace digital work. With Matrix42 you improve employees work experience, increase security, and automate services providing a higher quality of service to your valued users.
Visit Website
Neurilink

Neurilink

Neurilink
At Neurilink, we create reliable and easy-to-use workplace AV solutions that restore productivity and reinforce your company's professional image. Get a quote for your meeting rooms, training rooms, auditorium and shared spaces.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website

EXHIBITORS & ASSOCIATIONS

Ampersand

Ampersand

Ampersand
Ampersand is the leading technology services provider in Alaska delivering cybersecurity and risk management, enterprise software integration and architecture, hybrid cloud hosting solutions and more. We are tech experts and strategists who will help your organization achieve its goals.
Visit Website
ARMA Boise

ARMA Boise

ARMA Boise
The Boise Valley Chapter of ARMA International offers a forum for professional education, community awareness of the importance of records management, and to foster a sense of professionalism among its members.
Visit Website
CSA Boise

CSA Boise

CSA Boise
The Cloud Security Alliance (CSA) is a non-profit with a mission to promote best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing.
Visit Website
Idaho Technology Council

Idaho Technology Council

Idaho Technology Council
The mission of the Idaho Technology Council is to help technology companies in Idaho start, grow, and thrive. We are a member-driven organization committed to the success of Idaho’s technology ecosystem.
Visit Website
InfraGard Idaho

InfraGard Idaho

InfraGard Idaho
InfraGard is a partnership between the FBI and the private sector. It's an association of businesses,academic institutions,law enforcement agencies,and other participants dedicated who share information to prevent hostile acts against the U.S.
Visit Website
ISACA Boise

ISACA Boise

ISACA Boise
With more than 100,000 members in more than 180 countries, ISACA (www.isaca.org) is a recognized worldwide leader in IT governance, control, security and assurance.
Visit Website
ISSA Boise

ISSA Boise

ISSA Boise
The primary goal of the Information Systems Security Association, Inc. (ISSA) is to promote management practices that will ensure the confidentiality, integrity and availability of organizational information resources.
Visit Website
PMI Western Idaho

PMI Western Idaho

PMI Western Idaho
The PMI Western Idaho Chapter’s mission is to advance the practice and profession of Project Management.
Visit Website
Verkada

Verkada

Verkada
Verkada provides cloud-managed security solutions—video surveillance, access control, alarms, and more—designed to simplify physical security and deliver real-time insights for safer, smarter buildings.
Visit Website
VMUG Boise

VMUG Boise

VMUG Boise
The VMware User Group (VMUG) is an independent, global, customer-led organization, created to maximize members’ use of VMware and partner solutions through knowledge sharing, training, collaboration, and events.
Visit Website

Interested in becoming part of our next Boise event?

CONTACT US FOR INFO

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.