F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Virtual Dallas-Oklahoma 2022 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Dallas-Oklahoma EVENTS

AT A GLANCE

February 24th, 2022
8:30am – 4:30pm

Virtual Conference
Multi-track seminars with Q&A
1-on-1 chat and networking
Hourly prize drawings

KEYNOTE: [1 CPE] Leading and Innovating in a Hyperconnected World

  Presented by Mike Mathews • Vice President for Technology and Innovation, Oral Roberts University

Seminar Schedule

  • Theater One
  • Theater Two
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Stopping Ransomware with Autonomous Response

  Presented by Darktrace

Join Brianna Leddy, Darktrace’s Director of Analysis, as she unpacks some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Thinking Upstream: Avoid the Fallout of the next Log4Shell

  Presented by Tidelift

News of a zero-day vulnerability in the popular open-source project Log4j broke in December, leading many organizations scrambling to figure out the impact on their applications. Nearly every organization developing applications was impacted, and the fallout was so broad that the FTC issued guidance.

Log4Shell comes on the heels of the U.S. White House cybersecurity executive order 14028, an attempt by the United States government to use its purchasing power to create positive changes to the way cybersecurity is addressed around the world.

Recent high-profile breaches like Log4Shell, the Colonial Pipeline ransomware attack, or the SolarWinds software supply chain attack have shown that our cybersecurity defenses are woefully inadequate. This executive order forces a higher standard of cybersecurity for any organization selling software to the federal government, which in turn makes it the de facto global standard for all software in the future.

Tidelift CEO and co-founder Donald Fischer shares his perspective on how the Log4Shell vulnerability and the cybersecurity executive order impact software supply chain security. He’ll brief attendees on the key issues addressed by the executive order, including software bill of materials (SBOM), supply chain security, and provenance requirements. He’ll outline the gaps that most organizations will need to close to stay in compliance. And he’ll share a proactive approach to addressing open-source software supply chain health and security upstream.

If you want to ensure your organization is fully prepared for the coming changes, you won’t want to miss this session.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Protecting Your Critical Data

  Presented by Optiv & Rubrik

Businesses today rely heavily on technology and data. Though most organizations have developed strategies to access critical data during an outage caused by natural disasters or power disruptions, these strategies are ineffective during a cyber attack. Interconnected users, servers, cloud devices, and continuous web access results in an environment that is open for cybercriminals to significantly disrupt operations and/or take an entire network hostage.

How can you support the identification and protection of critical data that must be shielded from the impact of cyber attacks, while also enabling rapid recovery to a secure state? Join us to learn how you can automatically store backups in a malware-protected, air-gapped vault or a remote cloud-based solution that safeguards your data’s confidentiality, integrity, and availability. We’ll discuss how you can ensure your data is verified and clean before entering the vault and is maintained in an immutable state while within the vault, significantly reducing recovery time by guaranteeing that you are recovering to a known good state.

Topics: Business Continuity / Disaster Recovery
12:00 - 12:50 PM

[1 CPE] Cyber Attack Responder Viewpoints

  Presented by Jeremy Wilson • Deputy CISO, State of Texas

This session will cover lessons learned from the State of Texas’ Cybersecurity Program. We will focus on how to prepare for and respond to a cybersecurity attack. There are plenty of low and no-cost options and activities that can help your organization prepare. We will provide additional information and services specifically for governmental entities in the State of Texas, but other organizations will still find value in our approach and how we deal with different types of attacks from Nation-State Advanced Persistent Threat (APT) actors to opportunistic hacktivists.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Stopping Zero-Day Ransomware with Autonomous Incident Response

  Presented by Airgap

New strains of ransomware are leaving organizations vulnerable and show no sign of slowing down; security teams are unable to respond proportionately to an attack, leading to cyber disruption across the organization. This can affect all industries including manufacturing, critical infrastructure, healthcare, or any organization like yours and mine.

Join this session to unpack some of 2022’s most advanced ransomware threats and their behavior. Also, you can learn how to fix network flaws from the core for connected OT/IT/IoT, and stop lateral threat movement in every stage of the Cyber Kill Chain. If you have concerns about Zero-Day exploits or are assigned with Zero Trust initiatives, don’t miss this opportunity to learn how you can take autonomous action with 24/7 availability to stop the threat on its track. We’ll discuss:

  • Recent ransomware threat trends, including double extortion and RDP attacks in OT and ICS
  • How Autonomous Response takes DEFCON action to contain an emerging zero-day attack unattended with Zero Trust policy enforcement
  • Real-world examples of ransomware detection through agentless segmentation and containment
Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Immutable Storage: Level-Up Ransomware Readiness

  Presented by Arcserve

IDC advises that a 3-2-1-1 strategy is the new best practice for effectively protecting customers against ransomware. The last 1 is the important piece of the puzzle, where a copy is also stored on immutable storage. The growing risk of compromise to your customers’ data – specifically via ransomware DEMANDS the most up to date and complete solutions arsenal.

Topics: Data Storage, Information Security
Mike MathewsMike MathewsVice President for Technology and Innovation, Oral Roberts University
3:00 - 3:50 PM

[1 CPE] Leading and Innovating in a Hyperconnected World

  Presented by Mike Mathews • Vice President for Technology and Innovation, Oral Roberts University

The acceleration in technology advancements within a hyperconnected world has forced many IT leaders to re-invent their standard mode of operations. In addition to being a great manager, leader, and coach, the IT leader of the future must be a world-class innovator. Michael Mathews will discuss the trends across the globe which have impacted most businesses while dissecting what it means to be an innovative leader across any organization.

Mike is currently the VP for Technology and Innovation at ORU, where he has served for the past 7 years. Mike has over 24 years of experience as a senior-level IT executive bringing creative solutions that value the end-users of education, technology, and business process management. These solutions have benefited the end-users of higher education, manufacturing, and high technology company products. Mike spent 12-years working at Cray Research where he trained hundreds of supercomputer engineers across major industry sectors.

Mike has held positions as a VP of Innovation, Chief Information Officer, General Manager of CIOs, Chief Strategist for Innovation, Business Development Officer, Trainer, Teacher, and Vice President of Academic Services for leading corporations and higher education. Mike has been a CIO within higher education and corporate training for over 19 years. Mike has spoken in ten different countries during the past five years to educate governments and leaders on educational modalities.

Mike is the author of three books and hundreds of articles on theology, education, and technology that is shifting the worldview for everyone.

Mike was named 2021 Leading Education Technologist by Chief Information Officer Reviews, 2020 Top 20 Business Leaders by Industry Wired, 2019 Top Ten Innovators by Industry ERA, one of America’s Top 30 Education innovators in 2017, and a 2018 CIO 100 Award Winner.

  • Sessions
9:00 - 9:50 AM

[1 CPE] Ten Easy Things You Can Do Today to Secure Your Online Presence

  Presented by Pedro Serrano • Chief Information Security Officer, Grand River Dam Authority

In this presentation, Pedro Serrano will take a quick look at the most important security issues that every company should be educating its users on.

  1. You are the Target
    • Why you are the target – it’s all about Money!
    • How much data are you sharing?
  2. Social Media
    • You should check your settings, regularly!
  3. Protect your PC
    • Pedro’s 5 rules for home PC
  4. Passwords Sharing Devices
    • With so many passwords, let's learn how to manage
    • Best password managers available today
  5. Protect your home network with a simple change in your router
    • OpenDNS – free and it works!
  6. Two Factor Authentication
    • Easy ways to implement it (This is now the new normal)
  7. Online purchases – we all do!
    • How to protect yourself - Debit vs. Credit card
  8. Backup your data (Work – Home – Phone)
    • Can you verify that it’s there?
  9. Microphones are always on! – Who is listening?
    • You carry and have them in your home
    • Your car is listening, and I know where you are
  10. Credit Freeze – It’s really easy now!

The main theme of this session could be summarized like this:

The Human element: I can add all the technical controls that I can get my hands on but if my employees (internal users) behave in a matter that is not safe (like clicking on a link that is malicious) the technical controls will not be able to stop an attack. Therefore, you are the first and last line of defense, you can make the difference!

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] The Insider Threat You Don’t See Coming

  Presented by INTERFACE Advisory Council

IT leaders spend countless hours focusing on security awareness training and safeguarding systems. End-users of all types have been thoroughly educated on what not to do and taught how to identify threats. Now with so many employees working remotely, this has only added to the challenges of good cyber hygiene.

In recent months, we have seen the “great resignation” as employees are quitting jobs at record numbers. Some of this is through job dissatisfaction while some are leaving to spend more time with family. The question to ask now is, have IT departments armed employees to be a new insider threat? Could a disgruntled employee now intentionally allow a threat to get through your systems? How can you tell malicious intent by an end-user vs. an innocent mistake?

Join the INTERFACE Advisory Council for a discussion about this threat. These challenges are nothing new but have quickly become more complex and common.

Panelists:

  • Aaron Baillio • Chief Information Security Officer, University of Oklahoma
  • Jonathan Kimmitt • Chief Information Security Officer, University of Tulsa
  • Daisha Pennie • Manager, IT Compliance, Oklahoma State University
Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Chain Reaction: CISA Task Force & the Cyber Supply Chain

  Presented by Chad Kliewer • Information Security Officer, Pioneer Telephone Cooperative

We've all heard of “supply chain” by now. How do we go about actually doing something about it? Chad Kliewer will introduce the CISA Task Force that has been digging into supply chain issues for several years and share some resources – even some specifically designed for small and medium businesses – to adopt sound cyber supply chain practices.

Chad Kliewer is the Information Security Officer overseeing the cybersecurity and privacy programs for Pioneer Telephone Cooperative in Kingfisher, OK. He has over 20 years of experience in Information Technology and Security from PC Tech to CIO, including PCI, HIPAA, and SOX compliance. During his career, Chad has worked in healthcare, banking, and telecommunications, and has been outsourced, insourced, and resourced working with companies from 50 employees to more than 50,000 employees giving insight to companies large, small, and between. He holds a master’s degree in Cybersecurity and Information Assurance from Western Governors University, is currently serving on the board for InfraGard Oklahoma, and maintains the CISSP and several other certifications.

Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Robin Austin
CTO / CISO
Colliers Group

Mack Avery
Manager, Cyber Security Operations
Marathon Petroleum Company

Aaron Baillio
Chief Information Security Officer
University of Oklahoma

Chris Barnes
Chief Technology Officer
Howard CPAs

Rajan Behal
Director, KPMG Cyber
KPMG

Johnny Berry
System Engineer
BMS Designs

Craig Broussard
Director, Global Infrastructure
NCH Corporation

Keith Burlison
Chief Technology Officer
Federal Aviation Administration

Garreth Cada
Sr Manager, Information Technology
City Credit Union

Bob Carver
Principal Cybersecurity Lead
Verizon

Alan Chuang
Director, Information Technology
Trinity Consultants

Ivana Cojbasic
Chief Information Security Officer
Regions Bank

Dan Connett
Enterprise Architect
Federal Aviation Administration

Garry Cook
Manager, Information Technology
Phillips Theological Seminary

Victor Ford
Information System Security Officer
Federal Aviation Administration

Neil Gray
Manager, Information Systems
OK City of Nichols Hills

Rebecca Harden
Manager, IT Projects
Central Pyramid

Eric Hileman
Executive Director, IT Services
Oklahoma City Public Schools

Geoff Hughes
Sr Manager, Application Security
Accenture

John Jordan
Security Architect, IT
Texas Instruments

Hamid Khaleghipour
Director, Information Technology
TX City of Addison

Mansoor Khan
Director, Technology Transformation
Citigroup

Jon Kirchen
Manager, Application Services
OK Office Management & Enterprise Services

Chad Kliewer
Information Security Officer
Pioneer Telephone Cooperative

Terry Koenn
Director, Information Security
Experian

Sean Lenihan
Manager, Information Services
Ranger Capital Group

Chris Martin
Director, Technical Services
MYCON General Contractors

Nelson Morgan
Director, Information Technology
OK Housing Finance Agency

Mart Nelson
Chief Technology Officer
Avistas

Daisha Pennie
Manager, IT Compliance
Oklahoma State University

Jon Rogers
Chief Information Security Officer
Continental Resources

Roberto Ruiz
Manager, Information Technology, Americas
Expeditors International

Yoshi Salvat
Manager, Infrastructure Support
Expeditors International

Kevin Sesock
Chief Information Officer
Oklahoma Municipal Assurance Group

Vani Shanmugam
Lead, CCPA
Michaels

Shamoun Siddiqui
Vice President & CISO
Neiman Marcus

Jeff Story
Chief Information Security Officer
The Bankers Bank

Jay Thirumalai
Information Technology Program Manager
US Department of Homeland Security

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

SILVER SPONSORS

Airgap

Airgap

Airgap
Airgap's Agentless Zero Trust Isolation™ platform is the best defense against ransomware propagation. Put an end to threat propagation and protect your infrastructure - in minutes, not months.
Visit Website
Arcserve

Arcserve

Arcserve
Arcserve is a global top 5 data protection vendor with best-in-class solutions that manage, protect, and recover all data workloads, from SMB to enterprise and regardless of location or complexity. A 100% channel-centric organization, Arcserve has a presence in over 150 countries, with 19,000 channel partners and 235,000 customers.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
Optiv

Optiv

Optiv
Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential.
Visit Website
Tidelift

Tidelift

Tidelift
Tidelift provides a proactive approach to managing open source effectively for application development teams. The Tidelift Subscription can improve the health, security, and resilience of your organization’s open source software supply chain.
Visit Website

BRONZE SPONSORS

Bifrost Cloud

Bifrost Cloud

Bifrost Cloud
Bifrost is making distributed cloud storage a reality for the B2B market. Object storage that is more secure, more durable, and with higher availability for a fraction of the cost.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website

EXHIBITORS & ASSOCIATIONS

ARMA Dallas

ARMA Dallas

ARMA Dallas
ARMA International provides education and networking opportunities to information professionals to enable them to use skills and experience to leverage the value of records and knowledge as corporate assets and as contributors to organizational success.
Visit Website
CSA North Texas

CSA North Texas

CSA North Texas
As with any new technology, there are many questions and a need to establish standard protocols. Cloud computing offers significant benefits, including meaningful cost savings, global accessibility and almost infinite scalability.
Visit Website
InfraGard Oklahoma

InfraGard Oklahoma

InfraGard Oklahoma
The InfraGard Oklahoma Members Alliance (IOMA) is an information sharing effort serving the interests, and combining the knowledge base, of a wide range of members.
Visit Website
ISACA Tulsa

ISACA Tulsa

ISACA Tulsa
ISACA is a leading global provider of knowledge,certifications, community, advocacy and education on information systems (IS)assurance and security, enterprise governance and management of IT, and IT-related risk and compliance.
Visit Website
ISSA North Texas

ISSA North Texas

ISSA North Texas
The primary goal of the Information Systems Security Association, Inc. (ISSA) is to promote management practices that will ensure the confidentiality, integrity and availability of organizational information resources.
Visit Website
ISSA Oklahoma

ISSA Oklahoma

ISSA Oklahoma
Our goal is to be the community of choice for Oklahoma’s cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.
Visit Website
ISSA Oklahoma City

ISSA Oklahoma City

ISSA Oklahoma City
The primary goal of the Information Systems Security Association, Inc. (ISSA) is to promote management practices that will ensure the confidentiality, integrity and availability of organizational information resources.
Visit Website
OWASP Dallas

OWASP Dallas

OWASP Dallas
OWASP Foundation is a professional association of global members and is open to anyone interested in learning more about software security.
Visit Website
OWASP Oklahoma City

OWASP Oklahoma City

OWASP Oklahoma City
OWASP Foundation is a professional association of global members and is open to anyone interested in learning more about software security.
Visit Website
PMI Central Arkansas

PMI Central Arkansas

PMI Central Arkansas
The Central Arkansas Chapter of the Project Management Institute is a dynamic non-profit organization of Project Management Professionals dedicated to serving the business and educational community of Central Arkansas.
Visit Website
PMI Dallas

PMI Dallas

PMI Dallas
Making project management indispensable to business results is a major PMI objective. The PMI Dallas Chapter supports this initiative through project management education, member involvement and corporate involvement.
Visit Website
PMI Oklahoma City

PMI Oklahoma City

PMI Oklahoma City
We aspire to be Oklahoma’s preeminent source of project management principles and resources enabling business and organizational success. We promote the practice, science, and profession of project management through networking, outreach, and education.
Visit Website

Interested in becoming part of our next Dallas-Oklahoma event?

CONTACT US FOR INFO

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.