F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Hawaii 2019 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

September 18th, 2019
8:30am – 4:30pm

Sheraton Waikiki
Hawaii Ballroom
2255 Kalakaua Avenue
Honolulu, HI 96815

KEYNOTE: Transforming Technology to Fuel Innovation

  Presented by Brook Conner • Assistant Superintendent & CIO, Hawaii State Department of Education

Seminar Schedule

VIEW FLOORPLAN
  • Theater One
  • Theater Two
  • Theater Three
  • AM Sessions
  • PM Sessions
  • Keynote
9:00 - 9:50 AM

7 Steps to Improved Business Continuity

  Presented by Quest Software

Aaron Newsome will kick off the first half of the session discussing:

Steps to Improved Business Continuity

  • Knowing your risks (perform a risk assessment)
  • Know your data & applications (define criticality per application and not all data & apps are created equal)
  • Know your goals, set objectives for each classification
  • Know your tools, review your current capabilities against business requirements
  • Build an in-depth defense, utilize tools to achieve goals

STAY PROTECTED

  • Document your plan, get buy-in and WIN confidence
  • Challenge your plan, test your defense in layers
Topics: Business Continuity / Disaster Recovery
10:00 - 10:50 AM

Welcome to the New Age of Converged Secondary and Primary Storage

  Presented by StorageCraft

Gone are the days of deciding between a storage solution that can solve either data protection OR primary storage requirements. OneXafe is a scale-out converged storage solution that solves both data protection and primary storage challenges. Want to protect hundreds of VMs in a few clicks? No problem. Want to recover a multi-TB VM in less than a second? No problem. Need an enterprise file serving, archiving, or VMware storage solution? No Problem. Want to seamlessly recover an application in the cloud? No Problem. Attend this seminar session to learn more and see OneXafe in action!

Topics: Data Storage
11:00 - 11:50 AM

Integrated Risk Management

  Presented by ServiceNow

Organizations need to transform inefficient processes by combining security, IT, and risk capabilities into an integrated risk program which provides continuous monitoring, prioritization, and automation to ensure rapid identification and response to risks.

Topics: Strategic Management
1:00 - 1:50 PM

Disaster Recovery for the Cloud Era

  Presented by Druva

More and more enterprises are now leveraging the cloud to increase their level of data protection and management for their applications. The ability to keep secondary, or backup data in cloud storage; eliminates traditional data centers, reduces operational complexity associated with legacy on-premise backup solutions, allows unlimited scalability, centralizes storage of all secondary data sources, provides unlimited compute, allows for additional insight and business value from that data. and finally, and finally, the ability to do automated Disaster Recovery (DR) without maintaining a DR facility.

Topics: Business Continuity / Disaster Recovery
2:00 - 2:50 PM

How to Level Up on Information Security Risk Assessment

  Moderated by INTERFACE Advisory Council

Do the words "Risk Assessment" send knots to your stomach? Are you interested in doing an assessment, but not sure what to expect? Join the Advisory Council for a panel discussing real life experiences conducting information security risk assessments, how to get started, what to look out for and tips and tricks. You don't have to be a walking target!

Panelists:

  • Curt Dodds • IT Manager, Institute for Astronomy, University of Hawaii
  • Russell Seeney • President, InfraGard
  • David Stevens • IT Program Director, Kapiolani Community College
Brook ConnerBrook ConnerAssistant Superintendent & CIO,Hawaii State Department of Education
3:00 - 3:50 PM

Transforming Technology to Fuel Innovation

  Presented by Brook Conner • Assistant Superintendent & CIO, Hawaii State Department of Education

The Hawaii State Department of Education has embarked on a multi-year journey to move from legacy technology to a modern, cloud-based enterprise-grade environment. Most organizations want their technology environment to enable innovation, but for the public schools, innovation is table stakes. Every individual public school is charged with creating the right environment to serve the needs of their own unique community, leading to widespread innovation. So our new technology environment is being built with flexibility and agility foremost. While there's much more work to be done, we've already replaced Lotus Notes with Google and are on our way to a comprehensive transformation. The end result? Technology for the students to help them lead the second half of the twenty-first century.

David Brookshire "Brook" Conner was appointed on Sept. 25, 2017 to oversee HIDOE's information and telecommunication systems, facilities, and services of the public school system and department-wide operations. The Office of Information Technology Services (OITS) ensures that information technology and telecommunications support are being provided efficiently and effectively, and in accordance with laws, policies, and accepted principles of management. The scope of OITS' technical oversight includes voice, data, video, information systems infrastructure, and support services for schools and for complex areas and state administrative offices. Support services to schools are exercised in collaboration with the complex area superintendent.

Conner has served in high-profile information technology (IT) positions, most recently as the first chief information security officer and vice president for Estée Lauder Companies where he constructed a cyber security program, managed a budget of $22 million and ensured compliance. He also worked for Morgan Stanley as an executive director and global head of vulnerability management, Bloomberg LP, and as an adjunct professor at New York University. Conner has also published numerous books and papers on a variety of IT topics.

  • AM Sessions
  • PM Sessions
9:00 - 9:50 AM

Overcoming the Challenges Unstructured Data Growth with Hyperscale

  Presented by Cloudian

How do you break through the capacity barrier and gain simplicity and one-click data management in your data center, across sites, around the world, or in the cloud? Organizations are looking to do more, at less cost, and derive more value from data. We will be discussing how organizations are creating a global data fabric with simplified management across clouds.

Topics discussed will include S3 native storage as a service, how to manage and protect unstructured data, enable DR, and reduce the risk and cost associated with traditional approaches to data storage.

Topics: Data Storage
10:00 - 10:50 AM

If You Don’t Protect the Key, Don’t Encrypt the Data

  Presented by nCipher Security

For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the same amount of time, the keys used to perform the encryption have been the weakest link in the chain. After 2000 years, technology has advanced such that the keys can be protected but many companies don't understand how important it really is. We will explain in an entertaining (and sometimes graphic) fashion why protecting the encryption key is more important than the encryption itself.

Topics: Information Security
11:00 - 11:50 AM

A New Era of Data Protection: Converged DR and Backup

  Presented by Zerto

In today's always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. Being prepared for any data related disaster is key!

  • The cost and business impact of downtime and data loss can be immense
  • Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by software problems and cyber security related disasters
  • Having a plan and process in place will help you mitigate the impact of an outage on your business.

In this presentation we will address the challenges, needs, strategies, and solutions.

Topics: Business Continuity / Disaster Recovery
1:00 - 1:50 PM

Petabyte Is the New Terabyte: Getting a Handle on Your Ever-Expanding Data

  Presented by Qumulo

Legacy storage solutions weren't designed for today's increasing data needs. Everything from Video Surveillance Files, User Files, GIS, Aerial Imagery, PACS Images, Archives, Machine Learning, Genomic Sequencing, to just simple Log Files are growing in size and velocity. Qumulo has designed a distributed files system that is simple to use and can scale cost effectively to address the data growth challenges all businesses are facing today. Join us to learn how easy it can be to manage data at scale with real-time analytics to provide visibility into your data.

2:00 - 2:50 PM

Welcome to the New Age of Converged Secondary and Primary Storage

  Presented by StorageCraft

Gone are the days of deciding between a storage solution that can solve either data protection OR primary storage requirements. OneXafe is a scale-out converged storage solution that solves both data protection and primary storage challenges. Want to protect hundreds of VMs in a few clicks? No problem. Want to recover a multi-TB VM in less than a second? No problem. Need an enterprise file serving, archiving, or VMware storage solution? No Problem. Want to seamlessly recover an application in the cloud? No Problem. Attend this seminar session to learn more and see OneXafe in action!

Topics: Data Storage
  • AM Sessions
  • PM Sessions
10:00 - 10:50 AM

Gaining Network Visibility with Application Intelligence

  Presented by Gigamon

Come discuss how gaining visibility into your network has become more of a challenge than ever before. With the evolution from the Data Center to Virtual Environments, Public and Private Clouds, our exposure has never been greater.

In this session we will cover Span vs. TAP, Traffic Aggregation, Packet Brokers, Traffic Intelligence, Virtual Environments and how to get that one view of all your data.

Learn how to maximize the ROI on your existing tools while increasing your scope of visibility.

Who knows, you might even have fun?! Heckling Encouraged!

11:00 - 11:50 AM

Digital Transformation(Dx): Disrupt Your Organization and Drive Competitive Advantage

  Presented by Vladimir Abadzhiev • Director, Enterprise Applications & Data Management; Hawai`i Pacific University

Have an initiative that involves people, process and tools? You have gotten so far; you and your team have worked hard to build a solution in an attempt to transform the "we have always done it this way" culture. And now you hit a roadblock and not sure how to proceed to realize the potential. If you relate to this experience, then this session is for you. We will cover the basic definition and hype around digital transformation (Dx). We will talk about customer experience (Cx) and we will expand on the "new" trends around flipping the human-machine dynamic.

All of this effort will secure executive buy in and generate results beyond your imagination.

Open Forum Q&A as time permits.

12:00 - 12:45 PM

Criminal & Hacker Hardware Demos

  Presented by Bob Monroe • Board Member, Institute for Security and Open Methodologies

Curious about the hardware criminals can use? ISECOM will be showcasing and demonstrating different tools easily available to criminals and discussing how to protect against those attacks. Demos will be done throughout the day at the ISECOM table, just outside of Theater 3.

Come see demonstrations of hardware tools hackers use, including:

  • HackRF One
  • Portapack
  • Nooelec Ham It Up Upconverter
  • r00tabega
  • WiFi Pineapple
  • deauther
  • Frequency Radio Signal Counter
  • Rubber Ducky
  • Bad USB
  • NFC jewelry
  • Raspberry Pi Zero W with GPS, XBee, LoRa, WiFi, BLE inside a power strip Raspberry Pi running Kali ESP 8288 boards
1:00 - 1:50 PM

Gap Analysis: Configuring O365/Azure Environment for NIST800-171 Compliance

  Presented by David Stevens • IT Program Director, Kapiolani Community College

Supply chain cybersecurity scrutiny is increasing across the entire critical infrastructure ecosystem, not just the Department of Defense. This presentation reviews the common gaps found in subcontracting environments that use Microsoft Office 365 and/or Azure IT environments and includes advice for configuring, monitoring, automating and reporting upon shared National Institute of Standards & Technology (NIST) 800-171 controls.

In this session, attendees will learn how to:

  • Evaluate the common gaps found in subcontracting environments that use Microsoft Office 365 and/or Azure IT environments
  • Gather advice for configuring, monitoring, automating, and reporting upon shared NIST 800-171 controls.
2:00 - 2:50 PM

Agile Mindset & Everyday Kanban

  Presented by Erin Kaohelaulii-Brett • Chapter Leader; Women in Agile

The world is changing quicker than we can keep up! The demands for us to constantly innovate, rapidly develop and continuously improve should be at the forefront of every business model. Companies can choose to either Sink, Float or Swim.

  • What are leading businesses doing to adjust to the rapid pace?
  • How can you provide value to your customers quickly and leave the door open for feedback?

In this session, you'll learn about the Agile Mindset and beneficial tools/techniques that you can use in your everyday life to organize, manage and quickly deliver value to your business.

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Vladimir Abadzhiev
Director, Enterprise Systems & Infrastructure
Hawaii Pacific University

Michael Cardenas
Director, Operations
HRG Technologies

David Chang
Director
First Presbyterian Church

Nathan Chang
Manager, IT Client Services
The Queen’s Health Systems

Curt Dodds
Manager, Information Technology
U of H, Institute for Astronomy

Cody  Down
Chief Information Officer and Associate Vice President
Hawaii Pacific University

Dominic Dumlao
Manager, End User Tech
Queens Health Systems

Alan Ito
Information Security Officer
Hawaii Pacific Health

Andrew Lanning
Co-Founder
Integrated Security Technologies

Jacob Lowder
Information Technology Director
MPS Hawaii

Michael Marcum
Chief, Information Technology
USACE Enterprise IT Services (ACE-IT) Army Corp of Engineers

Dana Mendoza
IT Director
VIP Food Service

Geoff Milford
Technical Analyst
Hawaii Pacific Health

Tak Miyahira
Director, Information Technology
Austin, Tsutsumi & Associates, Inc.

Henderson Nuuhiwa
CIO & Program Administrator
Board of Water Supply

Russell Seeney
President
InfraGard

Jim  Sleutel
VP, Information Protection
Finance Factors

Dave Stevens
Professor, Information Security Program
Kapiolani Community College

Tony Velasco
Division Chief
City & County of Honolulu Dept of IT

Dwight Victor
Systems & Network Team Lead
General Dynamics Missile Systems

Greg Wolf
ESS Manager
Matson

Allen Zhang
Manager, Information Protection & Privacy
Hawai’i Medical Service Association

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

StorageCraft

StorageCraft

StorageCraft
Arcserve is a global top 5 data protection vendor with best-in-class solutions that manage, protect, and recover all data workloads, from SMB to enterprise and regardless of location or complexity. A 100% channel-centric organization, Arcserve has a presence in over 150 countries, with 19,000 channel partners and 235,000 customers.
Visit Website

SILVER SPONSORS

Cloudian

Cloudian

Cloudian
Cloudian turns information into insight with a scalable platform that consolidates, manages and protects enterprise data. Cloudian brings cloud technology and economics to the data center with uncompromising data durability, intuitive management tools and the industry’s most compatible S3 API.
Visit Website
Druva

Druva

Druva
Druva™️ delivers data protection & management for the cloud era. Druva Cloud Platform is built on AWS & offered as-a-Service & drives down costs by up to 50 percent, delivering globally accessible, scalable & autonomous enterprise data resiliency.
Visit Website
Gigamon

Gigamon

Gigamon
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
nCipher Security

nCipher Security

nCipher Security
nCipher Security, a leader in the hardware security module (HSM) market, empowers world-leading organizations by delivering trust, integrity and control to their business critical information and applications, IoT, blockchain and digital payments.
Visit Website
Quest Software

Quest Software

Quest Software
At Quest, we solve complex problems with simple solutions. Our philosophy is focused on great products, great service and being simple to do business with. We deliver technology that eliminates the need to choose between efficiency and effectiveness.
Visit Website
Qumulo

Qumulo

Qumulo
Qumulo, the leader in data-aware scale-out NAS, helps CIOs and storage administrators store, manage and curate enormous numbers of digital assets.
Visit Website
ServiceNow

ServiceNow

ServiceNow
ServiceNow is changing the way people work. ServiceNow provides service management for every department in the enterprise including IT, human resources, facilities, field service and more.
Visit Website

BRONZE SPONSORS

ONE IDENTITY

ONE IDENTITY

ONE IDENTITY
One Identity portfolio of identity governance, access management, privileged management and identity as a service solutions, helps organizations optimize identity and access management (IAM).For more info, visit http://www.oneidentity.com.#GetIAMRight
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website
Western Digital

Western Digital

Western Digital
Western Digital creates environments for data to thrive, helping customers capture, preserve, access and transform an ever-increasing diversity of data.
Visit Website

EXHIBITORS & ASSOCIATIONS

AMD & HP

AMD & HP

AMD & HP
For more than 20 years HP and AMD have been partnering to drive innovation in high-performance computing and graphics. Our combined vision is to create technology that makes life better for everyone, everywhere — every person, every organization, and every community around the globe.
Visit Website
ASIS Hawaii

ASIS Hawaii

ASIS Hawaii
ASIS International is the preeminent organization for security professionals. Founded in 1955, ASIS is dedicated to increasing the effectiveness and productivity of security professionals.
Visit Website
Cohesity

Cohesity

Cohesity
Cohesity delivers a web-scale platform that simplifies data protection, consolidates file and object services, provides instant access to test/dev copies, spans from the edge to the cloud, and performs in-place searches and analytics.
Visit Website
ExtraHop

ExtraHop

ExtraHop
ExtraHop delivers enterprise cyber analytics that allow you to quickly investigate threats, ensure the delivery of critical applications, and secure your investment in the cloud.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet helps organizations across the public and private sectors protect the systems, data, and services that keep businesses and communities running. From government agencies and schools to enterprises and service providers, leaders rely on Fortinet to secure critical infrastructure, ensure operational continuity, and defend against evolving cyber threats. Our Security Fabric platform unifies networking and security to deliver the visibility, control, and efficiency organizations need to operate confidently, whether virtual, in the cloud, or on-premises.
Visit Website
HICTA

HICTA

HICTA
HICTA is an association dedicated to fostering the development of Information, Communications, and Technology (ICT) Professionals in the State of Hawaii and to advance the progression of HICTA members across industries.
Visit Website
HPE Juniper Networking

HPE Juniper Networking

HPE Juniper Networking
Juniper Networks is now part of HPE. Together, we're building industry-leading, secure, AI-native networks – purpose-built with and for AI. As AI and networking converge, we're driving a bold transformation across enterprises, service providers, and cloud operators.
Visit Website
ISACA Hawaii

ISACA Hawaii

ISACA Hawaii
Aloha and welcome to the ISACA Hawaii Chapter. The aim of the Chapter is to sponsor educational seminars, workshops, conduct chapter meetings, and help promote and elevate the visibility of the IS audit, control and security profession throughout the area.
Visit Website
ISECOM

ISECOM

ISECOM
It is always about having security that works right and all the time. ISECOM (the Institute for Security and Open Methodologies) is the non-profit, cutting-edge security research organization that is changing the landscape of how the world knows security. Be a part of it!
Visit Website
ISSA Hawaii

ISSA Hawaii

ISSA Hawaii
Welcome to ISSA's Hawaii Chapter, a group of information security professionals devoted to providing educational forums, publications and peer interaction opportunities that enhance the knowledge skills and growth of its members.
Visit Website
Mitel

Mitel

Mitel
We are the business communication experts powering more than 2 billion connections every day, including over 33 million daily cloud connections. We help companies connect, collaborate and take care of their customers anywhere, anytime, over any device.
Visit Website
Nutanix

Nutanix

Nutanix
Nutanix makes IT infrastructure invisible with an enterprise cloud platform that delivers the agility and economics of the public cloud, without sacrificing the security and control of on-premises infrastructure.
Visit Website
PMI Hawaii

PMI Hawaii

PMI Hawaii
PMI is the world's leading not-for-profit membership association for the project management profession. PMI Honolulu's mission is to promote the project management practice and profession through networking, sharing of project experiences, training, education, and certification in the State of Hawaii.
Visit Website
Sungard Availability Services

Sungard Availability Services

Sungard Availability Services
Sungard Availability Services is a leading provider of critical production & recovery services.With more than 40 years of experience Sungard designs, builds & runs critical IT services that manage complex IT, adapt quickly, build resiliency & availability.
Visit Website
Varonis

Varonis

Varonis
Varonis is a pioneer in data security and analytics, specializing in software for data protection, threat detection and response, and compliance. Varonis protects enterprise data by analyzing data activity, perimeter telemetry, and user behavior; prevents disaster by locking down sensitive data; and efficiently sustains a secure state with automation.
Visit Website
VPLS Solutions

VPLS Solutions

VPLS Solutions
VPLS is your trusted global provider for cloud-to-edge computing and technology services. From hardware and software procurement to managed services, customers worldwide trust VPLS for their cloud, colocation, hosting, backup, and cybersecurity needs.
Visit Website
Women in Agile

Women in Agile

Women in Agile
Women in Agile is a collective effort to recruit, network, promote, and support the work of outstanding women in the agile community through blogging, speaking at events, and building a network surrounded by people of all genders.
Visit Website

Interested in becoming part of our next Hawaii event?

CONTACT US FOR INFO

Hawaii

Sheraton Waikiki
Hawaii Ballroom
2255 Kalakaua Avenue
Honolulu, HI 96815

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.