F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Boise 2023 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Boise EVENTS

AT A GLANCE

August 24th, 2023
8:30am – 4:30pm

Boise Centre
Grand Ballroom
850 W. Front Street
Boise, ID 83702

Directions & Parking

Venue Accessibility

KEYNOTE: [1 CPE] Views from the Porch: Tackling the Enablement of a Cybersecurity Workforce

  Presented by Ed Vasko • Director, Institute for Pervasive Cybersecurity, Boise State University

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Theater Three
  • Theater Four
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Transforming Networks: Harnessing AI and ML for Optimal Performance

  Presented by Pine Cove Consulting & Ruckus

In today's digitally interconnected world, networks play a critical role in ensuring seamless communication and data transfer. However, network performance and reliability can often be challenging to maintain. Each year, we see an increased number of devices added to our networks along with more use of high-bandwidth applications. IT teams often lack the tools to ensure required network service levels in an environment of ever-increasing user connectivity demands and network complexity. This presentation aims to explore the potential of artificial intelligence (AI) and machine learning (ML) techniques in overcoming these challenges.

The presentation will delve into various strategies and technologies that can help organizations improve their network performance. We will discuss proactive approaches to troubleshoot network issues before they escalate, saving valuable time and resources. By leveraging AI-powered tools and techniques, attendees will learn how to gain quick yet in-depth insights into their network's health, enabling them to identify and resolve potential bottlenecks efficiently.

This presentation will also emphasize the importance of customized data reports in network management. Attendees will discover how AI and ML tools can process vast amounts of network data, providing valuable information tailored to their specific needs. This capability allows network administrators to make informed decisions and optimize network performance based on relevant metrics and key performance indicators.

Additionally, cloud radio resource management (CRRM) will be explored to address co-channel interference—a common problem in wireless networks. We will shed light on how CRRM leverages AI and ML to intelligently allocate and manage radio resources via algorithms, mitigating interference and enhancing overall network performance. Attendees will gain insights into the benefits of this approach and its potential to revolutionize wireless network operations.

Overall, this presentation aims to empower network administrators and professionals with the knowledge and tools to transform their networks using AI and ML. By embracing these cutting-edge technologies, organizations can enhance network performance, ensure better reliability, and streamline their operations in the ever-evolving landscape of modern networking.

Topics: Artificial Intelligence, Infrastructure
10:00 - 10:50 AM

[1 CPE] Hybrid Cloud: Empowering IT with Resiliency, Multicloud Strategies, Optimal Spend, & Sustainability

  Presented by Michael Donahue, Sr Director, Hybrid Cloud Solutions • Hitachi Vantara

The hybrid cloud has emerged as a game-changing paradigm for modern IT infrastructure, offering IT Leaders and above a wealth of opportunities to drive innovation and efficiency. With the ever-increasing demand for cyber resiliency, flexibility, and sustainability, it is crucial for IT constituents to grasp the intricacies of the hybrid cloud, including key concepts such as security, multicloud, nearcloud, cloud spend optimization, data refactorization, and sustainability practices.

Throughout the session, real-world case studies and examples will be shared from Day 0, Day 1, and Day 2 customers.

  • Day 0 means you want to take advantage of this new framework but are still working through how to adopt hybrid cloud, how to secure it, and how to recruit proper talent to maximize it.
  • Day 1 means your organization took the first step and has a minimum spend commit they must meet. However, you’re still unsure of how to meet it because you’re still determining which applications to refactor, which containerized microservices to adopt, how to reskill existing talent, and how to implement your compliance and governance strategy.
  • Day 2 means your organization has already overcome these hurdles. Nice work! Instead of worrying about hitting a minimum spend commit, you’re now focused on optimizing your environment to limit sprawling cloud costs and looking towards data repatriation efforts.

Participants will have the opportunity to engage in interactive discussions and pose questions, fostering a collaborative learning environment. By the end of this session, IT Leaders will have the knowledge and tools necessary to evaluate, plan, and implement hybrid cloud solutions that align with their organization's goals, including sustainability. Afterall, Hitachi is committed to providing solutions that are exclusively carbon-neutral or zero-carbon, ensuring a sustainable and environmentally friendly approach.

Topics: Infrastructure
11:00 - 11:50 AM

[1 CPE] CPaaS & CXaaS: The Future of Communication

  Presented by CompuNet

This presentation will explore the advantages of CPaaS and CXaaS, two cloud-based solutions that are revolutionizing the way businesses communicate and engage with customers. We will cover vendor options, procurement models, as well as security and compliance aspects, and how AI and machine learning can optimize these solutions. By the end of the presentation, you will gain a comprehensive understanding of how CPaaS and CXaaS can improve productivity, boost customer satisfaction, and drive revenue for your business in the current digital era.

Topics: Infrastructure, Unified Communications
1:00 - 1:50 PM

[1 CPE] Uniting Networking and Security to Build for a World that Never Stops

  Presented by Anthony James, Vice President, Security Strategy • Infoblox

Technology professionals are challenged with ensuring significant digital risks do not impact their organizations or those who depend on them. However, new approaches to networking and security are required with an increasingly distributed workforce, ever-more sophisticated cyberattacks, adoption of cloud-based infrastructures, and the rollout of 5G and IoT. Tomorrow's technology ecosystem must be built on new, highly resilient foundations. These foundations empower those responsible for network performance and protection with the visibility, context, and control to tame complexity, protect users and customers, and ensure their businesses will thrive in a world that never stops.

Topics: Data Center Technology, Information Security, Infrastructure
2:00 - 2:50 PM

[1 CPE] Panel: Retaining Your IT Staff in Idaho, Can it Be Done?

  Presented by INTERFACE Advisory Council

“The other company is offering higher wages. I get to work remotely as much as I want and get a four-day workweek. Sorry, but I must take it.” Have you heard this just a few times? So many IT hiring managers are having to find creative ways to keep staff members in-house. While budgets and major company overhauls can’t always be achieved, some methods can help.

Idaho has unique challenges in retaining IT staff. Join the INTERFACE Advisory Council for an open conversation on how to keep your local IT staff intact. This panel features local IT hiring managers and leaders dealing with these challenges in their shops. Bring your questions as there will be an opportunity to get advice on your specific needs.

Panelists:

  • Russ Cunningham, Manager, IT Security, ON Semiconductor
  • Cody Kreps, Director, Information Services, Nampa School District
  • Jason Mertz, Director, Information Technology, TruGrocer Federal Credit Union
Topics: Culture
Ed VaskoEd VaskoDirector, Institute for Pervasive Cybersecurity, Boise State University
3:00 - 3:50 PM

[1 CPE] Views from the Porch: Tackling the Enablement of a Cybersecurity Workforce

  Presented by Ed Vasko • Director, Institute for Pervasive Cybersecurity, Boise State University

Ed Vasko has spent over 30 years leading cybersecurity companies that provide critical services and platforms to clients around the world. Now he is deeply involved in solving the national crisis of not having an effective supply of cybersecurity workers to meet our national needs. In this keynote, he will share a career perspective of how this crisis developed and methods both educators and employers can take to begin solving our needs regionally and nationally. Come be a part of this "porch conversation" and join the discussion.

Ed Vasko, CISSP, is the Director of Boise State University’s Institute for Pervasive Cybersecurity. He is a cybersecurity leader and entrepreneur with over 30 years of industry experience. Prior to joining Boise State University, Ed established and was a Senior Vice President at Avertium, a leading national managed security and consulting provider. Before establishing Avertium, he was the co-founder and CEO of Terra Verde. Prior to being acquired by growth equity in 2018, Terra Verde was one of the nation’s largest providers of cybersecurity advisory and managed security services, with over 2,000 active clients around the world.

Ed’s other passion is tackling the challenge of enabling a “Ready to Work” cyber workforce. He has served on over 20 advisory boards providing expertise around cybersecurity industry needs, career pathways, and competency development. He has been appointed by multiple governors to lend his expertise to solving workforce challenges. He was the industry co-chair of the 2019 NICE Conference in Phoenix.

  • Sessions
9:00 - 9:50 AM

[1 CPE] Building a Ransomware Resilience Strategy

  Presented by Alfred Rojas, Systems Engineer • Zerto & 11:11 Systems

Ransomware attacks are affecting every industry and every size organization with the threats of downtime, data loss, reputation damage, and more. You can protect your organization from these threats by building ransomware resilience into your IT infrastructure. As ransomware threats evolve, so do the available technologies to protect your organization, and having a ransomware resilience strategy is more important than ever. In this session, we will discuss how:

  • The threat of ransomware has become systemic in data recovery planning
  • Prevention alone is not enough, and recovery alone is not enough
  • A ransomware resilience strategy relies on early detection to be effective
  • Air-gapped and isolated recovery are critical for ransomware resilience
  • Speed of recovery and minimal data loss recovery prevent ransom payments
Topics: Information Security
10:00 - 10:50 AM

[1 CPE] How Do You Secure ANY-ANY-NOW?

  Presented by Grant Asplund, Growth Technologies Evangelist • Check Point Software Technologies

  • ANY Device
  • ANY Location
  • Access To Corporate Resources NOW

Today, more than any other time in history, we are digitally connected. With a continuous rise in mobile-related attacks, and an ever-increasing use of mobile devices to perform business tasks, protecting your organization from mobile threats is more critical than ever. Despite our best efforts, threats and breaches continue to increase.

Join Grant Asplund for this insightful presentation to learn about the latest mobile and user protection including Check Point’s Harmony suite for securing users and access. Today’s mobile security needs to prevent the download of malicious files to mobile devices, not just from the web and email but also from collaboration tools like Teams and Slack, and others. Learn how you can achieve 99.7% efficacy against zero-day threats across your entire enterprise leveraging ThreatCloud, an industry-leading threat intelligence solution.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Zero Trust Framework as a Baseline for Identity Management

  Presented by Andrew Massi, Digital Security Consultant, Identity • Entrust

With the recent increase in cyber-attacks that involve the use of weak / compromised credentials, it is critical for organizations to secure their environment and resources with a Zero Trust framework and a Phishing resistant RBA in mind. Organizations can establish trust through verifiable, phishing-resistant, certificate-based identities across users, devices, and apps to implement a secure first line of defense against cyberattacks.

Today’s technology leaders must navigate different tools and methodologies yet remain confident they’re quantifying risk effectively. During this session, we'll be discussing emerging digital security trends and how your peers are shaping the way the market approaches cybersecurity and risk management.

Specifically, we will discuss:

  • How to establish trust across users, devices, and apps that secure a first line of defense
  • How to support the Zero Trust framework through the adoption of Phishing resistant passwordless authentication
Topics: Information Security
12:00 - 12:50 PM

[1 CPE] How I Really Feel About ChatGPT from an IP Lawyer’s Perspective

  Presented by Bradlee Frazer Esq., Partner, Hawley Troxell Law Firm  • INTERFACE Advisory Council

Everyone wants to use artificial intelligence to increase productivity. AI is a great way to maximize employee efficiency in the enterprise environment. But, in this interactive session, IP lawyer Brad Frazer will give you his perspectives on the legal risks of the unrestrained use of AI in the workplace. He’ll also give you some best practices for using it safely and correctly, to minimize your legal risks.

Bradlee Frazer is a partner with Hawley Troxell and is Chair of the firm’s Intellectual Property & Internet practice group. In addition to emphasizing and focusing on all facets of Internet law, Intellectual Property law, and Information Technology law, he also helps clients with related transactional work and litigation.

Brad is a published novelist, and he has also written extensively for national legal publications and law blogs. He is also a frequent speaker on internet, intellectual property, and computer law topics and is a regular guest lecturer at Boise State University on those subjects.

A Boise native, Brad began his legal career in 1989 as an intellectual property attorney and commercial litigator at a Boise-based law firm. In 1997 he accepted an in-house position as Senior Intellectual Property Counsel with Fortune 1000 company, Micron Electronics, Inc., and remained there through the company’s merger with Interland, Inc. (now Web.com), then the nation’s largest Web hosting company. He eventually became Deputy General Counsel for Micron Electronics, Inc., and Interland, Inc. From June 2003 to February 2006, Mr. Frazer served as Deputy General Counsel to MPC Computers, LLC, in Nampa, Idaho.

Topics: Artificial Intelligence, Digital Experience, Information Security
1:00 - 1:50 PM

[1 CPE] Networking Deep Dive: Moving Beyond 192.16

  Presented by Pine Cove Consulting

In the world of networking, where devices and vendors multiply, IT specialists face the challenge of supporting and troubleshooting a wide array of equipment. To provide IT professionals with a comprehensive understanding of network complexities and best practices, this presentation will:

  • Highlight the impact of broadcast and multicast on network performance and strategies for efficient management
  • Discuss VLAN best practices, emphasizing the importance of segregating network traffic to enhance security and optimize performance
  • Explore the growing demand for and challenges associated with Power over Ethernet (PoE) and provide insights into effectively managing power requirements
  • Review the advantages and disadvantages of wireless connectivity compared to wired connections for specific devices and scenarios
  • Emphasize the importance of DHCP (Dynamic Host Configuration Protocol) in network management, as well as the role of ARP (Address Resolution Protocol) and MAC-address tables in troubleshooting network issues
  • Examine vendor remote access as a critical aspect of network administration, addressing the challenges and best practices associated with granting remote access to external vendors for troubleshooting and support
  • Explain LLDP (Link Layer Discovery Protocol), CDP (Cisco Discovery Protocol), and LLDP-MED (Link Layer Discovery Protocol-Media Endpoint Discovery) policies, highlighting their significance in network discovery and device configuration
  • Explore the uses of SNMP (Simple Network Management Protocol), focusing on its role in network monitoring, performance management, and device configuration
  • Discuss Syslog, both local and remote, as a valuable tool for collecting and analyzing network event logs, aiding in troubleshooting and security investigations
  • Examine the placement of cameras and access control systems on the network, and the considerations for parallel networks, to ensure optimal security and performance
  • Acknowledge the challenges of implementing Voice over IP (VoIP) systems, highlighting the complexities, and emphasizing the importance of proper planning and configuration

By delving into these topics, this presentation equips IT professionals with valuable insights and practical knowledge for managing and troubleshooting complex networks. It aims to deepen their understanding of network intricacies, empowering them to make informed decisions and optimize network performance and security.

Topics: Infrastructure
2:00 - 2:50 PM

[1 CPE] Adding VX to Your LAN: A Primer on Overlay Networks

  Presented by CompuNet

As network infrastructure evolves, overlay networks are gaining popularity due to their ability to enhance network availability, security, and flexibility. Our presentation will offer a comprehensive overview of overlay network protocols and architectures, along with their role in enterprise networks. Join us to discover how overlay networks can benefit your organization and learn more about their implementation and management.

Topics: Business Continuity / Disaster Recovery, Information Security, Infrastructure
  • Sessions
9:00 - 9:50 AM

[1 CPE] Zero Trust—Let’s Dive into Security

  Presented by Kevin Heide, Director of Enterprise Networking • Cerium Networks

Spend the morning with us while we explore the world of Zero Trust Architecture—but with a twist. Instead of a high-level overview of this strategic cybersecurity approach, we'll get hands-on and show you practical examples using tools and environments that most of us are already familiar with.

Buckle up and join us on this exciting journey as we learn how to integrate different elements and policies across our organizations. We'll also focus on optimizing our policies and enhancing threat protection.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] The AI-Driven Enterprise: Next Generation Campus/Branch Solutions

  Presented by Mark Thames, Director, Global Partner Business Development – AI Driven Enterprise • Juniper Networks

Can you have a conversation with your network? Do you have any virtual employees? I am not talking about humans who work from home. Revolutionary technology only happens occasionally. If you look at the last revolutionary technology, it would have been the smartphone. Before the smartphone, it was the Internet. AI is the latest revolutionary technology that will transform so many of the things we do daily in our lives. In this session, we will talk about the types of AI and how they are being used for positive change. I will cover how many different industries are already leveraging AI to improve business outcomes and transform how we do business and tasks. I will also cover how Juniper Networks has leveraged AI to disrupt the Networking Industry.

Topics: Artificial Intelligence, Infrastructure
2:00 - 2:50 PM

[1 CPE] Protecting Files and Microsoft 365

  Presented by Rubrik

Join us to discuss how Rubrik protects Microsoft 365. During the second half we will discuss how Rubrik protects NAS or File servers with NAS Cloud Direct. Each area will provide a high-level overview followed up with a demonstration within Rubrik Security Cloud.

  • Sessions
9:00 - 9:50 AM

[1 CPE] Why is Critical Data Being Compromised?

  Presented by Matthew Olive, Partner Solutions Architect • Thales Group

Securing critical data and information was where this industry started a long time ago, but it became more challenging with the rapid growth of enterprise data in an interconnected world. The pandemic forced organizations to support a remote workforce and expose critical systems that were once only accessible from inside the company’s network. We’ve increased the attack surface and the number of vulnerabilities which has led to more data breaches. With the technology advancements in access management, data discovery and encryption we can once again shift the focus to securing our data and information. In this presentation, we will discuss a unified data-centric security approach and strategy to protecting your most critical data and information.

Matt Olive is a data security professional with over 20 years of technical cybersecurity experience. In his role at Thales Cloud Protection & Licensing, Matt is dedicated to providing customers with high-quality data security solutions that address security priorities and make the connected world more secure.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] How to Stop East/West Attacks in Your Data Center

  Presented by Aruba Networks

70% of all breaches are caused by endpoint security vulnerabilities, followed by lateral movement in the data center. Halt that hacker traffic. Attend this session to learn about a new category of data center switch that combines best-of-breed L2/3 switching with the industry's first hardware-accelerated programmable processor. This new tool augments your malware and ransomware detection and response capabilities by delivering stateful firewall services inline, at scale, with wire-rate performance and orders of magnitude improvement over traditional data center L2/3 switches. You will learn how to gain visibility and enforce security policy for all East/West flows between workloads to protect the critical assets in your data center.

Topics: Data Center Technology
11:00 - 11:50 AM

[1 CPE] Modernizing Physical Security

  Presented by Verkada

In this session, we’ll look at the technologies at the forefront of enterprise building security. Connected security devices can provide users with real-time insights and a full picture of the health and safety of their environments. We’ll explore how to minimize security risks, workplace frustrations, and costly inefficiencies with best–in–class solutions that provide a scalable way to easily configure, monitor and respond to events from anywhere. Learn how modernizing your physical security can help you seamlessly safeguard the physical world –– without sacrificing privacy –– to operate safer, smarter buildings.

1:00 - 1:50 PM

[1 CPE] Intune: What’s New and What’s Next

  Presented by Chris McDuffie, Vice President of Cloud Architecture • Structured

Microsoft Intune is quickly becoming a strategic part of not only device management, but compliance and security as well. Structured will cover what’s new and how Intune will impact your Windows PC strategy management.

Topics: Infrastructure

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Lorraine Bessmer
Manager, Cybersecurity
St Luke’s Health System

Laurel Caldwell
Director, IT Services
Latah County, ID

Michael Case
Manager, IT Service & Support
Blue Cross of Idaho

Brandon Cheyney
Systems Administrator
City of Nampa, ID

Russ Cunningham
Manager, IT Security
ON Semiconductor

Jennifer Dvorak
Chief Information Security Officer
ID Courts

Matt Fuhrman
Manager, Information Security & Privacy
Your Health Idaho

Steve Goff
Director, Information Technology
Northwest Lineman College

Jon Harris
Director, Information Technology
Wright Brothers, The Building Company

Patti Henderson
Director, Information Technology
Givens Pursley LLP

Scott Knights
Chief Information Security Officer
ID Dept of Health & Welfare

Cody Kreps
Director, Information Services
Nampa School District

Jenne Lacey
Director, Information Technology
Clearwater County

Jason Mertz
Director, Information Technology
TruGrocer Federal Credit Union

Josh Messner
Vice President, Technology
Office Environment Company

Daniel Monighetti
Director, Information Technology
Tovuti LMS

Marc Norton
Bureau Chief, IT Manager
ID State Tax Commission

Raul Pena
Manager, Information Technology
Payette County, ID

Misty Perry
Information Records Administrator
Ada County Highway District

Andrew Peterson
Manager, Information Systems Security
US Dept of Veterans Affairs

Robert Peterson
Director, Information Technology
Washington County, ID

Jason Povey
Chief Information Officer
Power County Hospital District

Morgan Poyser
Manager, Information Technology
Jack’s Urban Meeting Place

Adam Reno
Manager, IT Infrastructure Services
City of Boise, ID

Cody Shepherd
Sr Manager, IT Operations
Idaho Power Company

John Stiffler
Director, Corporate IT
Boise Cascade Company

Fred Warr
Manager, OIT
Boise State University

Dwayne Wright
Vice President, IT Infrastructure
CopperPoint Insurance Company

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

CompuNet

CompuNet

CompuNet
CompuNet is a leading U.S. information technology partner, headquartered in Boise, Idaho. The firm specializes in consultation, design and implementation services specifically tailored to solve business problems. With a best-in-class engineering staff and approach, CompuNet focuses on building lasting relationships that prioritize client satisfaction over sales through every step of the journey.
Visit Website
Hitachi Vantara

Hitachi Vantara

Hitachi Vantara
Hitachi Vantara helps enterprises create and derive value from their data. Its solutions include best-in-class data management, IT infrastructure and analytics products, IoT solutions and Smart Spaces technologies for a broad range of industries.
Visit Website
Pine Cove Consulting

Pine Cove Consulting

Pine Cove Consulting
Pine Cove Consulting has serviced educational institutions, government agencies, and businesses across the Rocky Mountain Region since 1993. Pine Cove is a Sophos Platinum Partner and offers a suite of cybersecurity products to protect your organization.
Visit Website
Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

11:11 Systems

11:11 Systems

11:11 Systems
11:11 Systems is creating a new model delivering the power of "Everything Connected" in connectivity, cloud, and security solutions for customers and partners.
Visit Website
Cerium Networks

Cerium Networks

Cerium Networks
Cerium is a recognized innovator and leading provider of a full suite of collaboration, contact center, networking, data center, and security solutions. We help medium to large businesses in the Northwest plan for and then realize the positive impact of technology on their business operations, strategies, and user experiences.
Visit Website
Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
Entrust

Entrust

Entrust
Entrust’s identity and data security solutions enable the Zero Trust maturity journey needed to help protect your organization, and we deliver convenient, secure digital interactions for your customers and citizens.
Visit Website
Infoblox

Infoblox

Infoblox
Infoblox unites networking and security to deliver unmatched performance and protection. Trusted by Fortune 100 companies and emerging innovators, we provide real-time visibility and control over who and what connects to your network, so your organization runs faster and stops threats earlier.
Visit Website
Qumulo

Qumulo

Qumulo
Qumulo, the leader in data-aware scale-out NAS, helps CIOs and storage administrators store, manage and curate enormous numbers of digital assets.
Visit Website
Right! Systems

Right! Systems

Right! Systems
Right! Systems, Inc. is an IT management services company that provides business-driven, multi-vendor IT solutions in Network Infrastructure, Virtualization, Storage, Unified Communications, Telepresence, Security, Mobility and Professional Services.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website

BRONZE SPONSORS

Adlumin

Adlumin

Adlumin
Adlumin's security and compliance automation platform helps organizations manage evolving threats and cybersecurity compliance requirements.
Visit Website
baramundi

baramundi

baramundi
baramundi Software offers efficient, secure, and cross-platform management of workstation environments. With over 20 years of UEM experience across the globe, over 4,000 customers benefit from our intuitive, single-interface platform.
Visit Website
Optiv

Optiv

Optiv
Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential.
Visit Website
TDS Telecom

TDS Telecom

TDS Telecom
TDS Telecommunications LLC (TDS Telecom/TDS®) delivers high-speed internet, TV entertainment, and phone services to a mix of rural and suburban communities throughout the U.S. With 1.2 million connections, TDS is a rapidly growing technology company. Powered by fiber-optics and new industry-leading technologies, TDS delivers up to 8 Gigabit internet speeds and offers internet-protocol based TV entertainment solutions along with traditional phone services. TDS also offers businesses VoIP advanced communications solutions, dedicated internet service, data networking, and hosted-managed services.
Visit Website
Technology Source

Technology Source

Technology Source
With access to over 500 service providers, Technology Source works alongside IT departments to create best-in-breed solutions that include Managed IT Services—including Cybersecurity, Telecom Services and Mobility Services. Our primary objective is to reduce operational expenses, improve efficiencies and deliver an outstanding customer experience for our client partners.
Visit Website
ValorC3

ValorC3

ValorC3
ValorC3 is a modern data center, cloud and connectivity partner that delivers agile, scalable IT solutions tailored to the relentless mid-market enterprise. Valor meets clients where they’re at and gets them where they need to grow, helping them navigate the rapidly changing digital landscape with flexible, high-density data centers, extensive infrastructure expansion capabilities, low latency networks, strong partnerships and decades of industry expertise.
Visit Website
VLCM

VLCM

VLCM
VLCM has been in business for over thirty years, and in that time, we’ve helped thousands of customers throughout the Rocky Mountain West find the proper solutions for their IT needs.
Visit Website

EXHIBITORS & ASSOCIATIONS

Anomali

Anomali

Anomali
Anomali transforms security operations with the power of analytics, intelligence, automation, and AI to deliver breakthrough visibility, threat detection and response, and cyber exposure management.
Visit Website
Asante Cloud

Asante Cloud

Asante Cloud
Asante Cloud is a woman- owned IT reseller specializing in Zero Trust cyber security, data protection, and cloud technologies. Based In Boise, Idaho and serving the Intermountain West region, we offer industry leading Cloud and Zero Trust products and services as well as providing project-based staff augmentation and full-time recruiting.
Visit Website
AWS

AWS

AWS
Whether you're looking for compute power, database storage, content delivery, or other functionality, AWS has the services to help you build sophisticated applications with increased flexibility, scalability and reliability.
Visit Website
Barracuda

Barracuda

Barracuda
Barracuda Networks is the worldwide leader in Security, Application Delivery and Data Protection Solutions. More than 200,000 global customers trust Barracuda to safeguard their employees, data, and applications from a wide range of threats. Barracuda provides easy, comprehensive and affordable solutions for email protection, application protection, network protection and data protection. We are continually innovating to deliver tomorrow’s security technology, today.
Visit Website
BeyondTrust

BeyondTrust

BeyondTrust
BeyondTrust provides context-aware Privileged Account Management and Vulnerability Management software solutions that deliver the visibility necessary to reduce IT security risks and simplify compliance reporting.
Visit Website
ByteSpeed

ByteSpeed

ByteSpeed
ByteSpeed has been providing IT Solutions, including custom built hardware, networking solutions, and professional IT services in all 50 states in the US since 1999. https://bytespeed.com/
Visit Website
Create Spaces

Create Spaces

Create Spaces
Create Spaces procures, designs, and installs commercial furniture, audio visual technology and provides skilled labor! Explore our extensive portfolio of excellent projects in the Boise area and beyond.
Visit Website
CrowdStrike

CrowdStrike

CrowdStrike
CrowdStrike® provides cloud-delivered endpoint and workload protection. Leveraging artificial intelligence (AI), the CrowdStrike Falcon® platform protects customers against cyberattacks on endpoints and workloads on or off the network by offering visibility and protection across the enterprise.
Visit Website
Ednetics

Ednetics

Ednetics
For more than 25 years Ednetics has been on a mission to directly address the challenges faced by schools in acquiring and utilizing technology. Recognizing the close relationship between higher education, libraries, and technological advancements, we expanded our focus to serve the public sector and our technology portfolio has grown. From modernizing operations with communications, network, cybersecurity, and data infrastructure to improving safety with physical security solutions. Today, we proudly support and empower educational institutions, libraries, local and state governments throughout the Western US.
Visit Website
ESET

ESET

ESET
For more than 30 years, ESET® has been developing industry-leading IT security software and services to protect businesses, critical infrastructure, and consumers worldwide.
Visit Website
Extreme Networks

Extreme Networks

Extreme Networks
Extreme Networks, Inc. (EXTR) delivers software-driven networking solutions that help IT departments everywhere deliver the ultimate business outcome: stronger connections with customers, partners and employees.
Visit Website
F5 Networks

F5 Networks

F5 Networks
F5 provides solutions for an application world. F5 helps organizations seamlessly scale cloud, data center, telecommunications, and software defined networking deployments to successfully deliver applications and services to anyone,anywhere, at any time.
Visit Website
Fatbeam

Fatbeam

Fatbeam
Connect to What’s Next Reliability. Scalability. Service. When speeds and connectivity are guaranteed, you have less to worry about and more time to focus on what will move your organization forward. Fatbeam makes this possible. We help businesses scale with lit and dark fiber options that improve network performance while eliminating connectivity issues and access.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
HPE Juniper Networking

HPE Juniper Networking

HPE Juniper Networking
Juniper Networks is now part of HPE. Together, we're building industry-leading, secure, AI-native networks – purpose-built with and for AI. As AI and networking converge, we're driving a bold transformation across enterprises, service providers, and cloud operators.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
Idaho Technology Council

Idaho Technology Council

Idaho Technology Council
The mission of the Idaho Technology Council is to help technology companies in Idaho start, grow, and thrive. We are a member-driven organization committed to the success of Idaho’s technology ecosystem.
Visit Website
InfraGard Idaho

InfraGard Idaho

InfraGard Idaho
InfraGard is a partnership between the FBI and the private sector. It's an association of businesses,academic institutions,law enforcement agencies,and other participants dedicated who share information to prevent hostile acts against the U.S.
Visit Website
ISACA Boise

ISACA Boise

ISACA Boise
With more than 100,000 members in more than 180 countries, ISACA (www.isaca.org) is a recognized worldwide leader in IT governance, control, security and assurance.
Visit Website
ISSA Boise

ISSA Boise

ISSA Boise
The primary goal of the Information Systems Security Association, Inc. (ISSA) is to promote management practices that will ensure the confidentiality, integrity and availability of organizational information resources.
Visit Website
Neat

Neat

Neat
Neat designs simple and elegant pioneering video devices for Microsoft Teams and Zoom Rooms, helping make the meeting space experience the best it can be. Continuously pushing boundaries, Neat devices are incredibly easy to install, set up and use.
Visit Website
PMI Western Idaho

PMI Western Idaho

PMI Western Idaho
The PMI Western Idaho Chapter’s mission is to advance the practice and profession of Project Management.
Visit Website
Proofpoint

Proofpoint

Proofpoint
Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.
Visit Website
Rain Networks

Rain Networks

Rain Networks
Rain Networks is a Value-Added-Distributor located near Seattle, Washington. The company was founded in 2003 with the vision of bringing the world's best technology products to the people that need them to make their business run more efficiently.
Visit Website
Ruckus Networks

Ruckus Networks

Ruckus Networks
Ruckus Networks is redefining connectivity around the globe. We build secure wired and wireless access networks for organizations that place a premium on connectivity experiences for end-users as well as simplicity and lower-cost-per-connection for IT.
Visit Website
STEP CG

STEP CG

STEP CG
When you choose STEP CG, you get a trusted partner that understands your business strategy. We’re a leading managed IT, security and cloud services provider with award-winning, nationwide solutions. We support a full portfolio of networking, voice, security and professional service solutions. Our network technology solutions are powered by strategic engineers and best of breed technologies across a wide range of industries.
Visit Website
Telarus

Telarus

Telarus
Find the best technology solutions for your business with Telarus, the leading privately-held brokerage in the US, offering over 160 top service providers.
Visit Website
Thales

Thales

Thales
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks.
Visit Website
Veritas

Veritas

Veritas
Optimize the protection, performance, and cyber resiliency of all your enterprise data and applications across any cloud, any environment, at any scale.
Visit Website
Verkada

Verkada

Verkada
Verkada provides cloud-managed security solutions—video surveillance, access control, alarms, and more—designed to simplify physical security and deliver real-time insights for safer, smarter buildings.
Visit Website

Interested in becoming part of our next Boise event?

CONTACT US FOR INFO

Boise

Boise Centre
Grand Ballroom
850 W. Front Street
Boise, ID 83702

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.