F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Virtual Hawaii-SoCal 2022 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Hawaii-SoCal EVENTS

AT A GLANCE

April 7th, 2022
8:30am – 4:30pm HST
11:30am - 7:30pm PDT

Virtual Conference
Multi-track seminars with Q&A
1-on-1 chat and networking
Hourly prize drawings

KEYNOTE: [1 CPE] Taking Control of Enterprise IoT Security

  Presented by Hillary Baron • Director of Research, Analytics, Cloud Security Alliance

Seminar Schedule

  • Theater One
  • Theater Two
  • Sessions
  • Keynote
9:00 - 9:50 AM HST | 12:00 - 12:50 PM PDT

[1 CPE] Ransomware: Who, What, Why & How…

  Presented by Check Point

Over the last 12 months, ransomware attacks surged by 93% with a devastating impact on businesses and industries worldwide. In today’s hybrid IT environment, preventing ransomware attacks seems like an impossible feat. But is it?

In this session, we will cover the latest ransomware trends and how you can protect your organization from falling victim to sophisticated ransomware attacks.

Topics: Information Security
10:00 - 10:50 AM HST | 1:00 - 1:50 PM PDT

[1 CPE] Thinking Upstream: Avoid the Fallout of the Next Log4Shell

  Presented by Tidelift

News of a zero-day vulnerability in the popular open-source project Log4j broke in December, leading many organizations scrambling to figure out the impact on their applications. Nearly every organization developing applications was impacted, and the fallout was so broad that the FTC issued guidance.

Log4Shell comes on the heels of the U.S. White House cybersecurity executive order 14028, an attempt by the United States government to use its purchasing power to create positive changes to the way cybersecurity is addressed around the world.

Recent high-profile breaches like Log4Shell, the Colonial Pipeline ransomware attack, or the SolarWinds software supply chain attack have shown that our cybersecurity defenses are woefully inadequate. This executive order forces a higher standard of cybersecurity for any organization selling software to the federal government, which in turn makes it the de facto global standard for all software in the future.

Tidelift CEO and co-founder Donald Fischer shares his perspective on how the Log4Shell vulnerability and the cybersecurity executive order impact software supply chain security. He’ll brief attendees on the key issues addressed by the executive order, including software bill of materials (SBOM), supply chain security, and provenance requirements. He’ll outline the gaps that most organizations will need to close to stay in compliance. And he’ll share a proactive approach to addressing open-source software supply chain health and security upstream.

If you want to ensure your organization is fully prepared for the coming changes, you won’t want to miss this session.

Topics: Information Security
11:00 - 11:50 AM HST | 2:00 - 2:50 PM PDT

[1 CPE] 5 CISOs and a Whole Lot of Thought Leadership

  Presented by EVOTEK

Today’s environment demands attention on several fronts. This is especially the case as it relates to information security. Companies, no matter their size, are dealing with the same issue – how to survive and thrive in a digitally dangerous climate. EVOTEK’s executive advisory team addresses this question daily via their unprecedented roster of thought-provoking CISOs. Grab a front-row seat and join them in this session as they share years of experience and colorful insights in and around information security.

Topics: Strategic Management
12:00 - 12:50 PM HST | 3:00 - 3:50 PM PDT

[1 CPE] How to Successfully Manage Technology Challenges for a Remote Workforce

  Presented by INTERFACE Advisory Council

Your workforce will be dispersed permanently following the pandemic. Companies will no longer have their staff under one roof. Employees are working remotely in your city and throughout the country. This certainly has brought many challenges for IT departments everywhere. This is however the new business reality and adjustments have been made over the last year and a half to deal with the permanent remote workforce.

What are the best programs for basic monitoring of work? Can a VPN be trusted to securely handle your security needs? Is there really any difference between Zoom and Teams? Join the INTERFACE Advisory Council for a discussion about these questions and more. These challenges are nothing new but have quickly become more complex and common. Also, we will address the mix of workers coming back into your office and how that affects physical workspace changes.

Panelists:

Michael Agtunong • Manager, Information Technology, Gather Federal Credit Union
Jeromy Giacosa • Vice President, Information Services, Exagen
Matthew Linzer • Manager, Information Technology, University of California Office of The President

Topics: Information Security, Infrastructure
1:00 - 1:50 PM HST | 4:00 - 4:50 PM PDT

[1 CPE] Endpoint Systems Management: Time to Rethink

  Presented by Quest Software

See the recent changes to the endpoint environment and how these affect your infrastructure. Learn how these changes affect your network design and what this means for your daily business. Learn more about the new technologies available for managing your endpoints and see some tips and guidelines to be prepared for what’s next.

Topics: Infrastructure, Strategic Management
2:00 - 2:50 PM HST | 5:00 - 5:50 PM PDT

[1 CPE] Breaking Down the 5 Most Disruptive Vulnerability Types

  Presented by Arctic Wolf

A vulnerability is a weakness in your infrastructure, networks, or applications that can potentially expose you to threats, such as data theft, denial-of-service attacks, or ransomware attacks. Join us as we discuss what makes vulnerabilities truly dangerous and take a deep dive into five types of vulnerabilities that risk management programs should focus on to most effectively eliminate risks.

We will cover:

  • The five riskiest types of vulnerabilities
  • Why they are dangerous and how bad actors exploit them
  • The key to identifying and protecting against them
Topics: Information Security
Hillary BaronHillary BaronDirector of Research, Analytics, Cloud Security Alliance
3:00 - 3:50 PM HST | 6:00 - 6:50 PM PDT

[1 CPE] Taking Control of Enterprise IoT Security

  Presented by Hillary Baron • Director of Research, Analytics, Cloud Security Alliance

Organizations rely on IoT devices to improve productivity, manage operations more efficiently, boost business opportunities, etc. To perform these functions IoT devices collect large amounts of sensitive data on the organizations, necessitating secure implementations of the entire IoT ecosystem. In this presentation, Hillary Baron, Director of Research - Analytics at CSA will cover:

  • The history and current state of IoT security
  • Leveraging and tailoring CSA’s IoT Controls Matrix
  • Future areas of research to improve IoT security

Hillary Baron is a Director of Research, Analytics for Cloud Security Alliance - a non-profit dedicated to defining and raising awareness about cloud security best practices. As a part of her role, she manages research projects on topics like blockchain/DLT, quantum-safe security, and the Internet of Things. Hillary also leads the ad-hoc survey research, including creating questionnaires, analyzing data, and reporting the findings. Formerly as a program manager, she spearheaded the creation of CSA's webinar program, CSACloudBytes, and developed it into an award-winning series. Hillary earned a CCSK v4 and a Master’s of Science at the University of Wisconsin – Stout.

Topics: Information Security
  • Sessions
9:00 - 9:50 AM HST | 12:00 - 12:50 PM PDT

[1 CPE] Reinforce Your Operations Through Network Modernization

  Presented by Spectrum Enterprise

With the rise in remote workforce models, protecting your network is imperative. In this session, you’ll discover how to achieve resiliency, redundancy, and diversity through a wholly-owned national network. How can you secure required upgrade certifications and meet compliance requirements when you need a tailored and customized solution with the option of a fully managed or co-managed network? Join us to learn more about how to reinforce your operations through network modernization to successfully overcome the impacts and challenges that we have collectively faced in the last two years.

Topics: Infrastructure
10:00 - 10:50 AM HST | 1:00 - 1:50 PM PDT

[1 CPE] Ransomware: Why Does This Keep Happening?

  Presented by Arctic Wolf

Join Coy Thorp, Systems Engineer for Arctic Wolf, as he discusses the history and evolution of ransomware and why it has become so difficult to detect and mitigate. The basic premise is this: organizations spend more today than ever before to address cybersecurity risk, yet breaches are on the rise and there is no end in sight. What can your company do to prepare itself for the attack that is imminently on the horizon?

Topics: Information Security
11:00 - 11:50 AM HST | 2:00 - 2:50 PM PDT

[1 CPE] Leveraging Assessment Findings to Harden Your Security Perimeter

  Presented by Fortinet

Are you regularly evaluating your network security?

Performing assessments is a tried-and-true method for improving your security posture, but they can be a daunting task for network security staff who are often short on manpower, expertise, and/or time. Regardless, the benefits of running assessments almost always outweigh any potential drawbacks. Having a security assessment in hand will increase your security situational awareness and significantly impact your organization’s risk preparedness and mitigation.

Join us as we discuss the importance of periodically validating your existing security controls and provide learnings and best practices from our experts.

Topics: Information Security
1:00 - 1:50 PM HST | 4:00 - 4:50 PM PDT

[1 CPE] Ransomware Protection Redefined: Protect, Alert, and Recover

  Presented by Veeam

Ransomware is malicious software that infects a computer and restricts access to crucial user data until a ransom is paid to unlock it. Ransomware is designed to spread through your network, exploiting technical and human vulnerabilities and leading to a significant impact on your business. Ransomware attacks were up 93% in 2021 and are no longer a question of if but when. Costs have skyrocketed to nearly two million dollars (US) per incident and have a global economic impact of over 20 billion dollars (US).

Join this session to learn how to ensure your backups are immutable, that you’ll be alerted of any possible ransomware attacks in your virtual environment, and that you’re able to recover those workloads free of any malware.

Topics: Information Security
2:00 - 2:50 PM HST | 5:00 - 5:50 PM PDT

[1 CPE] Immutable Storage: Level-Up Ransomware Readiness

  Presented by Arcserve

IDC advises that a 3-2-1-1 strategy is the new best practice for effectively protecting customers against ransomware. The last 1 is the important piece of the puzzle, where a copy is also stored on immutable storage. The growing risk of compromise to your customers’ data – specifically via ransomware DEMANDS the most up to date and complete solutions arsenal.

Topics: Data Storage, Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Michael Agtunong
Manager, Information Technology
Gather Federal Credit Union

Aaron Avilla
Director, Information Technology
The Art Source Inc

Kevin Brockenborough, Jr.
Director, Information Technology
Terminix

Rick Buddine
Chief Information Officer
BIT Corporation

David Chang
Director, Technical Support
First Presbyterian Church

Becky Christy
Director, Business Continuity
Southern Glazer’s Wine & Spirits

Evan Donaldson
Vice President, Programs
HDI

Cody Down
Chief Information Officer, Associate Vice President
Hawaii Pacific University

Ryan Field
Executive Vice President, Information Technology
Bank of Hawaii

Jeromy Giacosa
Vice President, Information Services
Exagen

Bill Higgs
Chief Information Security Officer
Cymer

Vince Hoang
Chief Information Security Officer
State of Hawaii

Ray Kelly
Vice President, Information Security, CISO
Millennium Health

Robert Kuhn
Director, IT Infrastructure & Security
Travere Therapeutics

Matthew Linzer
Manager, Information Technology
University of California Office of the President

Dana Mendoza
Director, Information Technology
VIP Food Service

Geoff Milford
Information Security Analyst
Hawaii Pacific Health

Tim Minick
Director, Information Technology
Pacific Guardian Life

Grant Nakamichi
Manager, IT Infrastructure
Aloha Pacific Federal Credit Union

Patrick O’Donnell
Director, Information Technology
Cerritos Community College

Dave Stevens
Professor, Information Security Program
Kapiolani Community College

Anh Tran
Manager, Information Technology
CA City of El Monte

Tony Velasco
Division Chief, Information Technology
HI City & County of Honolulu

Dwight Victor
Systems & Network Team Lead
General Dynamics Missile Systems

Monique Weiland
Project Manager
Southern California Edison

Charissa Wong
Manager, Information Technology
Bowers + Kubota Consulting

Alan Yamashiro
Information Security Project Manager
Hawaii Pacific Health

Susan Zielan
Manager, Business Continuity
CoreLogic

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website

SILVER SPONSORS

Arcserve

Arcserve

Arcserve
Arcserve is a global top 5 data protection vendor with best-in-class solutions that manage, protect, and recover all data workloads, from SMB to enterprise and regardless of location or complexity. A 100% channel-centric organization, Arcserve has a presence in over 150 countries, with 19,000 channel partners and 235,000 customers.
Visit Website
Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
EVOTEK

EVOTEK

EVOTEK
EVOTEK™ is North America's premier enabler of digital business with a focus on innovation. With technology offerings in cybersecurity, data center, automation and cloud, EVOTEK is uniquely equipped to enable customers with the industry shift from traditional IT computing to secure multi-cloud.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet helps organizations across the public and private sectors protect the systems, data, and services that keep businesses and communities running. From government agencies and schools to enterprises and service providers, leaders rely on Fortinet to secure critical infrastructure, ensure operational continuity, and defend against evolving cyber threats. Our Security Fabric platform unifies networking and security to deliver the visibility, control, and efficiency organizations need to operate confidently, whether virtual, in the cloud, or on-premises.
Visit Website
Quest Software

Quest Software

Quest Software
At Quest, we solve complex problems with simple solutions. Our philosophy is focused on great products, great service and being simple to do business with. We deliver technology that eliminates the need to choose between efficiency and effectiveness.
Visit Website
Spectrum Business

Spectrum Business

Spectrum Business
Spectrum Business® delivers a complete portfolio of secure connectivity solutions for small and mid-market businesses and caters to the unique needs of large businesses, communications service providers and government entities. Our industry-leading experts align our products to the needs of each customer, drawing from our full suite of services including internet solutions over hybrid fiber-coax and 100% fiber, video and voice solutions including phone and mobile, as well as unified communications and managed services tailored for our mid-market and large enterprise customers.
Visit Website
Tidelift

Tidelift

Tidelift
Tidelift provides a proactive approach to managing open source effectively for application development teams. The Tidelift Subscription can improve the health, security, and resilience of your organization’s open source software supply chain.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website

BRONZE SPONSORS

Airgap

Airgap

Airgap
Airgap's Agentless Zero Trust Isolation™ platform is the best defense against ransomware propagation. Put an end to threat propagation and protect your infrastructure - in minutes, not months.
Visit Website
Appgate

Appgate

Appgate
Appgate is the secure access company. We empower how people work and connect by providing solutions purpose-built on Zero Trust security principles. This people-defined security approach enables fast, simple and secure connections from any device and location to workloads across any IT infrastructure in cloud, on-premises and hybrid environments. Appgate helps organizations and government agencies worldwide start where they are, accelerate their Zero Trust journey and plan for their future.
Visit Website
ExtraHop

ExtraHop

ExtraHop
ExtraHop delivers enterprise cyber analytics that allow you to quickly investigate threats, ensure the delivery of critical applications, and secure your investment in the cloud.
Visit Website
Red Canary

Red Canary

Red Canary
The Red Canary Security Operations Platform, driven by purpose-built technology, security research, and threat intelligence, provides advanced threat detection and response across your entire IT estate to improve your security outcomes.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website
World Wide Technology

World Wide Technology

World Wide Technology
World Wide Technology (WWT) WWT, a $20B, privately held technology solutions provider leading the AI and Digital Revolution, has over 30 years of experience helping the world's largest organizations make the right technology decisions faster. Commercial enterprise, public sector and service provider clients work with WWT from strategy to execution bolstered by hands-on access to cutting-edge capabilities across infrastructure, data and AI, security, cloud and more through the Advanced Technology Center.
Visit Website

EXHIBITORS & ASSOCIATIONS

ACP Orange County

ACP Orange County

ACP Orange County
ACP is the premier organization for business continuity professionals providing a powerful networking and learning environment for its members.
Visit Website
AITP San Diego

AITP San Diego

AITP San Diego
The San Diego Chapter is the local community of members of the Association of Information Technology Professionals. The San Diego Chapter holds monthly meetings and produces the annual San Diego Cloud Computing Conference.
Visit Website
ASIS Hawaii

ASIS Hawaii

ASIS Hawaii
ASIS International is the preeminent organization for security professionals. Founded in 1955, ASIS is dedicated to increasing the effectiveness and productivity of security professionals.
Visit Website
ASIS Orange County

ASIS Orange County

ASIS Orange County
With approximately 38,000 security professionals and over 230 chapters worldwide. The Orange County Chapter is one of the largest chapters in Region 1D, which encompasses Southern California and Hawaii.
Visit Website
ASIS San Diego

ASIS San Diego

ASIS San Diego
ASIS International is the preeminent organization for security professionals. Founded in 1955, ASIS is dedicated to increasing the effectiveness and productivity of security professionals.
Visit Website
CSA

CSA

CSA
The Cloud Security Alliance (CSA) is a non-profit with a mission to promote best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing.
Visit Website
IIBA Hawaii

IIBA Hawaii

IIBA Hawaii
Local Chapters promote and support IIBA’s professional standards and practices. There are well established Local Chapters in global centers with new ones emerging throughout the IIBA network.
Visit Website
InfraGard Hawaii

InfraGard Hawaii

InfraGard Hawaii
InfraGard is a partnership between the FBI and the private sector. It is an association dedicated to sharing information and intelligence to prevent hostile acts against the U.S.
Visit Website
InfraGard Los Angeles

InfraGard Los Angeles

InfraGard Los Angeles
InfraGard is a national education and information sharing program created by and between the Federal Bureau of Investigation (FBI) and the private/public sector. There are InfraGard groups in cities around the country.
Visit Website
InfraGard San Diego

InfraGard San Diego

InfraGard San Diego
The purpose of the Infragard San Diego Members Alliance is to mitigate criminal- and terrorist-based threats, risks and losses.
Visit Website
ISACA Hawaii

ISACA Hawaii

ISACA Hawaii
Aloha and welcome to the ISACA Hawaii Chapter. The aim of the Chapter is to sponsor educational seminars, workshops, conduct chapter meetings, and help promote and elevate the visibility of the IS audit, control and security profession throughout the area.
Visit Website
ISACA San Diego

ISACA San Diego

ISACA San Diego
ISACA® is a nonprofit, independent association that advocates for professionals involved in information security, assurance, risk management and governance.
Visit Website
ISC2 Hawaii

ISC2 Hawaii

ISC2 Hawaii
The International Information Systems Security Certification Consortium, Inc., (ISC)², is the global, not-for-profit leader in educating and certifying information security professionals throughout their careers.
Visit Website
ISC2 San Diego

ISC2 San Diego

ISC2 San Diego
Our chapter’s mission is to conduct outreach to the general community within San Diego County and help increase the awareness and understanding of the information security field.
Visit Website
ISSA Hawaii

ISSA Hawaii

ISSA Hawaii
Welcome to ISSA's Hawaii Chapter, a group of information security professionals devoted to providing educational forums, publications and peer interaction opportunities that enhance the knowledge skills and growth of its members.
Visit Website
ISSA San Diego

ISSA San Diego

ISSA San Diego
The San Diego area chapter of ISSA is dedicated to building and maintaining a viable, self-sustaining, and responsive professional association that achieves the vocational objectives of its members in accordance with the by laws.
Visit Website
OWASP Orange County

OWASP Orange County

OWASP Orange County
The Open Web Application Security Project (OWASP) is a not-for-profit organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks.
Visit Website
PMI Hawaii

PMI Hawaii

PMI Hawaii
PMI is the world's leading not-for-profit membership association for the project management profession. PMI Honolulu's mission is to promote the project management practice and profession through networking, sharing of project experiences, training, education, and certification in the State of Hawaii.
Visit Website
PMI Orange County

PMI Orange County

PMI Orange County
PMI-OC creates value for our members and the community through Project Management excellence, leadership and innovation.
Visit Website
PMI Wine Country

PMI Wine Country

PMI Wine Country
WCC is the Wine Country Chapter of the Project Management Institute (PMI) which was chartered as a chapter in 2000. The WCC serves PMI members in the Marin, Sonoma, Lake, Mendocino, Humboldt, Trinity and Del Norte counties.
Visit Website

Interested in becoming part of our next Hawaii-SoCal event?

CONTACT US FOR INFO

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.