F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Virtual Dallas Oklahoma 2021 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

February 25th, 2021
8:30am – 4:30pm

Virtual Conference
Multi-track seminars with Q&A
1-on-1 chat and networking
Hourly prize drawings

KEYNOTE: A Regional Approach to Public Safety Infrastructure

  Presented by Bill Zielinski • Chief Information Officer, City of Dallas

Seminar Schedule

DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Sessions
  • Keynote
9:00 - 9:50 AM

Automating the Analyst

  Presented by Darktrace

Alongside the rise of today’s dynamic workforce, the speed and scale of sophisticated cyber-attacks are rapidly increasing. As the cybersecurity industry continues to endure an ongoing skills shortage, over-worked and under-resourced teams urgently need augmentation in order to defend against evolving, sophisticated threats.

For over three years, Darktrace experts have been working to meet this challenge, investigating whether they could teach AI to think like a cybersecurity analyst. It takes subtle, nuanced skills and implicit knowledge for an analyst to detect genuinely threatening activity, and the creation of the world-first Cyber AI Analyst took analyzing over one hundred of the world’s top threat analysts and complex machine learning algorithms. Join Darktrace as we discuss the Cyber AI Analyst in action.

Topics: Information Security
10:00 - 10:50 AM

Enduring from Home: COVID-19’s Impact on Business Security

  Presented by Malwarebytes

All of us are living in the new Work from Home normal caused by the rapid transmission and spread of COVID-19. While people everywhere have been worried about stopping the spread of COVID, malicious threats have not only continued to propagate but they have exploded in new and interesting ways. During this presentation we will review some of the more creative ways hackers have targeted business and individuals during the age of Work from Home and some ways to protect yourself from them.

Topics: Information Security
11:00 - 11:50 AM

Situational Awareness Into the Dark Web

  Presented by Check Point Software

In our journey through this session, we take you through the evolution, goals, and motivation of the Dark Web. We will share with you what and whom you can find on the platforms as well as the major conflicts individuals face while exploring this web. The session also exposes you to the syndicates and structures running on the platforms. Surprisingly, we see how those groups were among the first to embrace and implement Blockchain technology and created a major global demand for crypto currencies. This is the time to listen, learn, and be exposed to the deepest secrets of the Dark Web.

Topics: Information Security
12:00 - 12:50 PM

Critical Planning: Timeline and Lifecycle of Responding to a Ransomware Attack

  Presented by Shawn E. Tuma • Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP

This session will discuss the lifecycle of a ransomware attack and address key phases such as: how they happen, what the process is for recovery and investigation, and what can be done ahead of time to prepare for and hopefully prevent them from happening.

Bio:
Shawn is an attorney internationally recognized in cybersecurity, computer fraud and data privacy law, areas in which he has practiced for over two decades. Shawn helps businesses protect their information and protect themselves from their information.

He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice Group where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises, across the United States and globally in dealing with cybersecurity, data privacy, data breach and incident response, regulatory compliance, computer fraud related legal issues, and cyber-related litigation. While this area of the law has evolved greatly in the 20+ years while Shawn has been practicing, he continues to evolve with it as a practitioner representing his clients, academically as an author and instructor, and as an analyst for the national media.

Topics: Information Security
1:00 - 1:50 PM

What Does the Future Hold for Teleworking?

  Presented by INTERFACE Advisory Council

With the current pandemic, companies have mobilized to enable employees to work from home. IT departments took on this task in March. Many security and compliance challenges have been dealt with, but some remain.

Join the INTERFACE Advisory Council for a look at what lies ahead with remote working. How are you adjusting your security procedures? Do you know if your end-users will return to the office? The dreaded elephant in the room will be addressed as well – BUDGETS! What do you need? What is expected of your IT staff? You will get tips on what has worked and what still is a challenge in keeping your users active and ensuring your business is fully operational.

Panelists:
Aaron Baillio • Chief Information Security Officer, University of Oklahoma
Chris Martin • Director, Technical Services, MYCON General Contractors
Shamoun Siddiqui • Vice President & CISO, Neiman Marcus
Craig Broussard • Director, Global Infrastructure, NCH Corporation
Alan Chuang • Director, Information Technology, Trinity Consultants

Topics: Strategic Management
2:00 - 2:50 PM

You Are No Longer Forgotten: The Small Business Security Challenge

  Presented by Chris Roberts • HillBilly Hit Squad

Most of the security industry is chasing “around” 31,000 larger enterprise sized companies for their business. The list is well known, circulated and targets are on the backs of ALL the C-Suite, most of the technical folks and the MSP/VARS that support them. The Security industry circles them like packs of hyena or vultures waiting for one of them to fall, get breached, or for a vendor to be thrown out… pouncing on the fresh kill with glee…

Meanwhile, you’re sitting there getting slaughtered by every adversary known to mankind because you ARE the forgotten, you’re too small for the multi-billion $$ cyber companies whom IF they decide to deal with you will flood you with MSA’s, SOW’s and NDA’s that would take a week’s worth of lawyer time JUST to understand, let alone realize that they’re not accountable for anything, unlikely to want to support you and in all honestly you’ll get a 1-800-YOU-AREN’T-SPECIAL number as your sole source of support.

We’re going to address the current situation, the state of play, and give you some thoughts, suggestions, ideas AND plans. We’ll provide resources on HOW to evaluate, where to look, what to do AND importantly we’ll do it because it’s what we’re doing. We live, breath and deal with this daily. We’ve sat in the meetings when the large cybersecurity companies state, “we’re done dealing with the SMB market” and we’ve got the battle scars from dealing with those subsequent consequences.

Topics: Information Security
Bill ZielinskiBill ZielinskiChief Information Officer, City of Dallas
3:00 - 3:50 PM

A Regional Approach to Public Safety Infrastructure

  Presented by Bill Zielinski • Chief Information Officer, City of Dallas

Developing regional partnerships which leverage shared interests and common mission can create opportunities for significant cost savings, heightened capabilities and improved interoperability that can benefit the entire region. Join Bill Zielinski, CIO for the City of Dallas, as he discusses the model used in developing a regional Public Safety digital mobile radio network covering more than 1000 square miles across the greater Dallas area.

Bill Zielinski is the Chief Information Officer (CIO) for the City of Dallas, Texas where he directs IT operations for the 9th largest city in the United States, serving a population of more than 1.3 million people.

Most recently, Mr. Zielinski was the Assistant Commissioner for the Office of Information Technology Category (ITC) in GSA’s Federal Acquisition Service (FAS) where he managed a portfolio of government-wide IT acquisition contracts providing more than $25 billion in IT products and services from more than 5,000 providers to government at a Federal, State and Local level.

Mr. Zielinski formerly served as the Acting Unit Chief for Agency Oversight in the Office of the Federal Chief Information Officer (OCIO) in the Office of Management and Budget (OMB). There he provided oversight of the Federal Government’s Information Technology Capital Planning and Investment Control (CPIC) process on behalf of the Federal CIO. The Federal CIO is responsible for providing guidance on the formulation and oversight of an annual IT investment portfolio in excess of $85 billion.

Additionally, he has served as the Chief Information Officer for the Social Security Administration (SSA), where he was responsible for the delivery of IT solutions that allowed the Agency to effectively manage more than $800 billion in annual benefits to more than 60 million people around the world.

Topics: Infrastructure
  • Sessions
9:00 - 9:50 AM

Disaster Recovery Reality Check: Validating Your DR Strategy

  Presented by StorageCraft

Do you have a DR strategy? Learn more from those on the inside of data protection and disaster recovery. See how you compare to other’s DR capabilities and how to build a solid strategy. We’ll also cover key DRaaS capabilities and a solution to make part of our plan.

Topics: Business Continuity / Disaster Recovery
10:00 - 10:50 AM

CI/CD for Networking: Adopting DevOps Principles for a More Robust Network

  Presented by Infoblox

In recent years, continuous integration and continuous deployment, aka CI/CD, have become de facto standards for DevOps-minded software development organizations. Adoption of CI/CD enables software architects and IT specialists to create more flexible, secure and agile infrastructure with new features and functionality that are continually improved and deployed. While compute and storage aspects of environments have benefited greatly from CI/CD, network infrastructure has lagged behind.

This presentation pulls back the covers on efforts taking place to bring CI/CD philosophies to the work of revamping legacy, monolithic network architectures using cloud-native principles, microservices and containerization. The end goal is to create networks that are inherently more adaptable, scalable, automated and simpler to manage.

Speaker Bio: Glenn Sullivan is a Principal Product Manager for Emerging Technologies at Infoblox and joined the Infoblox team when SnapRoute, a company he co-founded in 2015, was acquired by Infoblox. At SnapRoute, Sullivan was responsible for product direction by advocating for the end-user. Prior to founding SnapRoute, Sullivan was responsible for building out hyperscale data center environments at Apple. In addition to core network operational functions, Sullivan led efforts to automate the lifecycle management of various platforms in a multivendor environment. Before Apple, Sullivan was a specialist support engineer on the LAN Switching team in Cisco TAC. While there, his specialty was in turning around customer sentiment by focusing on escalated issues and transforming the customer experience into a positive one. Sullivan has a BS in Network and Systems Administration from RIT (Rochester Institute of Technology).

Topics: Infrastructure, Unified Communications
11:00 - 11:50 AM

Disaster Recovery Reality Check: Validating Your DR Strategy

  Presented by StorageCraft

Do you have a DR strategy? Learn more from those on the inside of data protection and disaster recovery. See how you compare to other’s DR capabilities and how to build a solid strategy. We’ll also cover key DRaaS capabilities and a solution to make part of our plan.

Topics: Business Continuity / Disaster Recovery
12:00 - 12:50 PM

Talent by Design: The Cybersecurity Workforce Lifecycle and Challenge

  Presented by Cloud Security Alliance North Texas Chapter

Cloud security and the evolving cybersecurity technologies require different skill sets than 15 years ago. Many companies and leaders talk about the talent shortage, skills gap, and necessity for the right kind of training for the right kind of talent. People who are earning cross-certifications that combine skills – such as the Certified Cloud Security Professional (CCSP) co-created by (ISC)² and Cloud Security Alliance – are seeing a big boost in pay. If you have those skills, you're in a good position to command those higher salaries.

But what steps can we as the industry take to bring our community closer together to build the foundation early and have a starting point for new entrants – whether just out of college, coming out of a specialized program, out of the military, etc.

During this session, dynamic experts will share ideas on how we can leverage all the education, mentorship programs, and training and leadership skills-based workshops available to better contribute to the workforce in an evolving cybersecurity landscape.

Topics: Information Security
1:00 - 1:50 PM

First Line of Defense in Assessing your Organizations Cybersecurity Risks

  Presented by Fortinet

Assessing the resilience of your network can dramatically improve your ability to fend off prospective breaches. New applications and services introduce new avenues of attack. Without knowing the potential weaknesses within your network, you cannot successfully defend it.

Join us to hear about:

  • how assessments give you the visibility you need to make more informed, data-driven decisions
  • how you can prioritize strategic initiatives and obtain budgeting more easily by running assessments
  • how certain verticals (education, healthcare, et al.) can benefit from understanding their specific threat landscapes and common industry-wide threats.

During this session we will also cover:

  • a firsthand demonstration on how data is collected and processed, and logs are analyzed from your network during an assessment
  • contents of a sample findings report and how recommendations can help prioritize your security strategy
Topics: Information Security
2:00 - 2:50 PM

Threat Hunting 101

  Presented by CrowdStrike

Threats can come at you anytime and from any number of sources. In this session, Bradley Grandorff, Crowdstrike Systems Engineer, takes us through free form search and how he solved a real world incident that forced a customer to shut down their IT systems. Bradley will go in-depth on threat hunting techniques and help teach you what you need to be aware of. Learn tips from an expert with several decades of experience in information security working for companies such as Cisco, Splunk, and now Crowdstrike.

Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Robin Austin
CTO/CISO
Colliers Group

Aaron Baillio
Chief Information Security Officer
University of Oklahoma

Chris Barnes
Chief Technology Officer
Howard CPAs

Craig Broussard
Director, Global Infrastructure
NCH Corporation

Keith Burlison
Chief Technology Officer
Federal Aviation Administration

Alan Chuang
Director, Information Technology
Trinity Consultants

Dan Connett
Enterprise Architect
Federal Aviation Administration

Chase Conyer
Information Systems Planner
State of Arkansas

Kevin Dunn
Chief Information Officer
InRoll+

Fabio Francisca
Information Systems Manager
Expeditors International of WA Inc.

Neil Gray
Manager, Information Systems
City of Nichols Hills

Rebecca Harden
Manager, IT Projects
Central Pyramid

Nan Harrell
Professor, Computer Information Science
Arkansas Tech University

Eric Hileman
Executive Director, IT Services
Oklahoma City Public Schools

Geoff Hughes
Sr. Cloud Security Architect
Federal Reserve Bank

John Jordan
Security Architect, IT
Texas Instruments

Mansoor Khan
Sr VP, IT Audit
Citigroup

Chad Kliewer
Information Security Officer
Pioneer Telephone Cooperative, Inc

Ronnie Knight
Manager, Infrastructure & Systems
AFR Insurance

Kent Lewis
Information Security Officer
Southwest Medical Center

Chris Martin
Director, Technical Services
MYCON General Contractors

Chris Moss
Information Security Officer
Arkansas Tech University

Jomon Nadukkudiy
Sr. IT Architect
Verizon Communications

Mart Nelson
Chief Technology Officer
Avistas

David Nicpan
Director, Information Technology
Pulaski County Assessors Office

Jon Rogers
Chief Information Security Officer
Continental Resources

Roberto Ruiz
IT Manager for the Americas
Expeditors International

Joel Schwartz
Director, Information Technology
Oklahoma City Community Foundation

Kevin Sesock
Chief Information Officer
OMAG

Jaimin Shah
Information Security Officer
Greystar

Earl Shipman
IT Director
City of Cedar Hills

Shamoun Siddiqui
Vice President & CISO
Neiman Marcus

Greg Starnes
Network Coordinator
Families, Inc

Jeff Story
Chief Information Security Officer
The Bankers Bank

Bryce Tuck
VP, Security Engineering
Simmons Bank

Scott Tyree
Sr Manager Application Services Systems
American Cancer Society

Brody Walker
VP, IT Manager
First Security Bank

John Woods
VP, Information Security
PDX-NHIN

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

StorageCraft

StorageCraft

StorageCraft
Arcserve is a global top 5 data protection vendor with best-in-class solutions that manage, protect, and recover all data workloads, from SMB to enterprise and regardless of location or complexity. A 100% channel-centric organization, Arcserve has a presence in over 150 countries, with 19,000 channel partners and 235,000 customers.
Visit Website

SILVER SPONSORS

Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
CrowdStrike

CrowdStrike

CrowdStrike
CrowdStrike® provides cloud-delivered endpoint and workload protection. Leveraging artificial intelligence (AI), the CrowdStrike Falcon® platform protects customers against cyberattacks on endpoints and workloads on or off the network by offering visibility and protection across the enterprise.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet helps organizations across the public and private sectors protect the systems, data, and services that keep businesses and communities running. From government agencies and schools to enterprises and service providers, leaders rely on Fortinet to secure critical infrastructure, ensure operational continuity, and defend against evolving cyber threats. Our Security Fabric platform unifies networking and security to deliver the visibility, control, and efficiency organizations need to operate confidently, whether virtual, in the cloud, or on-premises.
Visit Website
Infoblox

Infoblox

Infoblox
Infoblox unites networking and security to deliver unmatched performance and protection. Trusted by Fortune 100 companies and emerging innovators, we provide real-time visibility and control over who and what connects to your network, so your organization runs faster and stops threats earlier.
Visit Website
Malwarebytes

Malwarebytes

Malwarebytes
Malwarebytes protects workplace productivity. We secure all your endpoints so employees can connect confidently, from anywhere. We combine analytics-driven, multi-layer threat protection and industry-leading incident response to both simplify and strengthen overall cybersecurity. You and your team stay up and running, so you can remain focused on driving your business.
Visit Website

BRONZE SPONSORS

Oklahoma Christian University

Oklahoma Christian University

Oklahoma Christian University
Oklahoma Christian University is committed to offering the best master’s degree experience for working professionals. OC’s high-quality, Christian graduate programs provide academic excellence and superior service for your needs.
Visit Website
Proofpoint

Proofpoint

Proofpoint
Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.
Visit Website
Qumulo

Qumulo

Qumulo
Qumulo, the leader in data-aware scale-out NAS, helps CIOs and storage administrators store, manage and curate enormous numbers of digital assets.
Visit Website
Rack59

Rack59

Rack59
RACK59 is a colocation data center in Oklahoma City, OK that provides secure solutions for medium to enterprise businesses. All customers, one rack or an entire private data center, benefit from RACK59’s premier facility, power, and connectivity.
Visit Website
Tenable

Tenable

Tenable
Tenable, Inc., is the Cyber Exposure company. Over 30,000 organizations around the globe rely on Tenable to understand and reduce cyber risk.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website

EXHIBITORS & ASSOCIATIONS

ARMA Dallas

ARMA Dallas

ARMA Dallas
ARMA International provides education and networking opportunities to information professionals to enable them to use skills and experience to leverage the value of records and knowledge as corporate assets and as contributors to organizational success.
Visit Website
ASIS North Texas

ASIS North Texas

ASIS North Texas
ASIS International is the preeminent organization for security professionals. Founded in 1955, ASIS is dedicated to increasing the effectiveness and productivity of security professionals.
Visit Website
CSA North Texas

CSA North Texas

CSA North Texas
As with any new technology, there are many questions and a need to establish standard protocols. Cloud computing offers significant benefits, including meaningful cost savings, global accessibility and almost infinite scalability.
Visit Website
ExtraHop

ExtraHop

ExtraHop
ExtraHop delivers enterprise cyber analytics that allow you to quickly investigate threats, ensure the delivery of critical applications, and secure your investment in the cloud.
Visit Website
Hillbilly Hit Squad

Hillbilly Hit Squad

Hillbilly Hit Squad
We’re a group that’s come together over the years and is now breaking cover on a number of fronts. Between the research, presentations, consulting, AND the upcoming release of some technology we’ve been working on, we are taking a stance FOR the small and medium businesses that are continually forgotten.
Visit Website
InfraGard Oklahoma

InfraGard Oklahoma

InfraGard Oklahoma
The InfraGard Oklahoma Members Alliance (IOMA) is an information sharing effort serving the interests, and combining the knowledge base, of a wide range of members.
Visit Website
ISACA Tulsa

ISACA Tulsa

ISACA Tulsa
ISACA is a leading global provider of knowledge,certifications, community, advocacy and education on information systems (IS)assurance and security, enterprise governance and management of IT, and IT-related risk and compliance.
Visit Website
ISSA North Texas

ISSA North Texas

ISSA North Texas
The primary goal of the Information Systems Security Association, Inc. (ISSA) is to promote management practices that will ensure the confidentiality, integrity and availability of organizational information resources.
Visit Website
ISSA Oklahoma City

ISSA Oklahoma City

ISSA Oklahoma City
The primary goal of the Information Systems Security Association, Inc. (ISSA) is to promote management practices that will ensure the confidentiality, integrity and availability of organizational information resources.
Visit Website
OWASP Dallas

OWASP Dallas

OWASP Dallas
OWASP Foundation is a professional association of global members and is open to anyone interested in learning more about software security.
Visit Website
OWASP Oklahoma City

OWASP Oklahoma City

OWASP Oklahoma City
OWASP Foundation is a professional association of global members and is open to anyone interested in learning more about software security.
Visit Website
PMI Central Arkansas

PMI Central Arkansas

PMI Central Arkansas
The Central Arkansas Chapter of the Project Management Institute is a dynamic non-profit organization of Project Management Professionals dedicated to serving the business and educational community of Central Arkansas.
Visit Website

Interested in becoming part of our next Dallas Oklahoma event?

CONTACT US FOR INFO

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.