F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Thank you to everyone who attended

INTERFACE Honolulu 2025

The Pacific's Premier Technology Event will return in 2026

INTERFACE Honolulu 2025

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Honolulu EVENTS

AT A GLANCE

May 22nd, 2025
8:30am – 4:30pm

Sheraton Waikiki
Kauai / Maui Ballroom
2255 Kalākaua Avenue
Honolulu, HI 96815

Directions & Parking

KEYNOTE: [1 CPE] Empowering Hawai’i’s Future: Leading IT Innovation in State Government

  Presented by Christine Sakuda • Chief Information Officer, State of Hawaiʻi

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] LIVE Hack: Unmasking AI’s Dark Side

  Presented by Wayne Johnson, CEO • Stellar

In this eye-opening presentation, we will delve into the darker applications of artificial intelligence, specifically focusing on its potential to craft malicious code and generate deceptive voice replicas. As AI continues to evolve, its capabilities extend beyond beneficial innovations, posing significant ethical and security challenges. This session aims to shed light on how AI can be manipulated to perform nefarious tasks, such as writing harmful software or impersonating voices with high accuracy. Through live demonstrations and critical discussions, we aim to equip the audience with a comprehensive understanding of these risks and foster a dialogue on developing robust countermeasures and ethical guidelines to prevent misuse of AI technologies. Join us as we explore the shadowy corners of AI applications, understanding their implications and preparing for a secure technological future.

Topics: Artificial Intelligence, Information Security
10:00 - 10:50 AM

[1 CPE] Demystifying Zero Trust: Simplifying Network Security

  Presented by Pete Lujan, Director, Systems Engineering • Fortinet

Today's ever-changing threat landscape challenges traditional security models. The emergence of the Zero Trust model represents a transformative approach, reshaping how organizations protect their assets. This presentation aims to demystify Zero Trust, offering a comprehensive understanding that goes beyond buzzwords. We will explore the foundational concepts of Zero Trust, emphasizing the "never trust, always verify" philosophy. By the end of this session, attendees will be equipped with the knowledge to begin their Zero Trust journey, enhancing their security posture, and protecting critical data and systems from modern threats. Whether you are a security professional, IT manager, or organizational leader, this discussion will empower you to take decisive action toward a more secure future.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Securing the Hyperconnected World in the AI Era

  Presented by Grant Asplund, Security Evangelist • Check Point

The AI revolution is fundamentally transforming cybersecurity, while the future of networking evolves toward Hybrid Full Mesh—integrating 5G, WiFi, Ethernet, Fiber, and other network infrastructures. This presentation examines how AI is accelerating cyber threats: attack costs are skyrocketing, incidents surging 50% year-over-year, and ransomware development compressed from nine days to mere minutes*. We'll explore why Hybrid SASE (not cloud-only) forms the core of an effective hybrid full-mesh security architecture and how organizations can respond when the rate of change and complexity outpace their capabilities. Most importantly, we'll demonstrate why security isn't just a feature but the essential foundation of operations in this new era of hyperconnected vulnerability.

*Source: 2025 Check Point Research, CyberInt, Cybercrime Magazine, IBM, SAN

Topics: Artificial Intelligence, Information Security
1:00 - 1:50 PM

[1 CPE] AI: The New Attack Surface

  Presented by Jeff Crume, Distinguished Engineer, Data and AI Security, IBM • Converge Technology Solutions

Artificial Intelligence introduces novel security challenges, including adversarial attacks and model vulnerabilities. Also, there is the issue of whether you can trust the AI you have. This session will cover six different types of AI attacks to provide a better understanding of the threatscape along with some suggestions for securing the data, the model, the usage and the infrastructure.

Topics: Artificial Intelligence, Culture
2:00 - 2:50 PM

[1 CPE] Building Hawaii’s Cybersecurity Future, Together

  Presented by Michael Cardenas, CTO, Co-Founder, MC3 Technologies • Vicinity

Hawaiʻi faces a growing cybersecurity threat landscape and yet thousands of IT and cyber positions remain unfilled locally. We will share why homegrown talent is key to strengthening our region’s digital resilience. This session explores today’s top cyber risks, practical steps for small businesses to boost their security, and how collaboration between industry, education, and community partners is critical for protecting Hawaiʻi’s future. Attendees will walk away with actionable strategies to enhance their cybersecurity posture and engage in workforce development efforts that build a stronger, more secure Hawaiʻi.

Topics: Business Continuity / Disaster Recovery, Culture, Information Security
Christine SakudaChristine SakudaChief Information Officer, State of Hawaiʻi
3:00 - 3:50 PM

[1 CPE] Empowering Hawai’i’s Future: Leading IT Innovation in State Government

  Presented by Christine Sakuda • Chief Information Officer, State of Hawaiʻi

Hawaiʻi State Chief Information Officer Christine Sakuda shares her journey transitioning from private sector leadership into her current role in the state’s central technology division. Sakuda will offer insights on how she fulfills the governors’ priorities while partnering with all executive departments to develop common IT solutions and will discuss her experience of learning to work with the legislature on bills and budget priorities.

Christine Sakuda has more than 25 years of experience in leading enterprise-level IT initiatives including leading community IT systems development, managing stakeholder relations, and collaborating with IT vendors to implement a range of technology modernization projects. She is the State’s first female CIO of Native Hawaiian ancestry. She also served as the first executive director of Transform Hawaii Government (THG), a nonprofit organization dedicated to catalyzing the modernization of public services through people, processes, and technology, and as the Executive Director of the Hawaiʻi Health Information Exchange (HHIE).

Topics: Culture, Strategic Management
  • Sessions
9:00 - 9:50 AM

[1 CPE] Don’t Build a Fire Department

  Presented by Tom Simonis, Sr Sales Engineer, Enterprise US • Arctic Wolf

Building and maintaining an internal SOC operation is hard. We’ll discuss why it’s imperative that organizations lean on 3rd party partners to provide 24x7 monitoring across your collective attack surfaces.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] AI or Die: Will Agentic AI and Hyperautomation Save the SOC?

  Presented by Aaron Edwards, Regional Sales Manager, and Rich Chen, Sales Engineer • Torq

The promise of SOAR has repeatedly failed. Organizations have invested heavily in enterprise solutions yet the ability to deliver automated, preventative, and corrective measures still remains a distant reality for most CISOs. Why? The concept of an Autonomous SOC is everywhere - promising to streamline security operations processes, reduce analyst alert fatigue, and improve overall security posture. But how does the dream of an Autonomous SOC play out in the real world of security operations? Is 2025 the year that Agentic AI where Hyperautomation saves the SOC?

Topics: Artificial Intelligence
11:00 - 11:50 AM

[1 CPE] Restoration in 72 Hours, Not 72 Days: Building Cyber Resilience in Healthcare

  Presented by Daniel Tang, Healthcare Solutions Engineer • Rubrik

A singular focus on prevention and security is proving necessary but not sufficient to ensure continuity of operations and quality care. In an era of increasing cyberattacks, understanding the foundational principles of cyber resilience is essential for safeguarding patient data, ensuring organizational resilience, and ultimately, upholding patient care standards.

This session will explore the core concepts of cyber resilience and how they enable rapid recovery following cyber-attacks. With a focus on quantifying the impacts to operational downtime, legal costs and regulatory fines, as well as reputational damage, this discussion is tailored to help C-suite leaders prioritize cyber resilience strategies.

  • Explore the fundamental principles of cyber resilience, focusing on preserving continuity of care and business operations.
  • Assess the financial and operational risks of data breaches and ransomware attacks, including real-world examples from healthcare.
  • Discuss how to communicate the value of and build support for cyber resilience initiatives.
Topics: Data Management, Information Security
12:00 - 12:50 PM

[1 CPE] Heart of Agile with Aloha: Driving IT Innovation

  Presented by Bradley K. Foster, PMP, CSM, CPO, CAC, CAL • Worth Agility

Join Bradley K. Foster, founder of Worth Agility, to explore how Alistair Cockburn’s Heart of Agile—Collaborate, Probe, Deliver, Reflect, Improve—blends with Aloha’s compassion to ignite IT innovation. With 5+ years in health and aviation IT, Bradley led Hawaiian Airlines’ EDW (Microsoft-driven, real-time insights), Health Catalyst’s cloud analytics at Queens (30% efficiency gain), and Hawaii DOT’s Google CCAI demo (40% faster calls).

Learn to probe risks early, collaborate across silos, and deliver secure systems under Worth Agility’s human-centered approach, guided by DevSecOps insights from Isaac Sacolick.

Ideal for IT leaders tackling ransomware, AI, and bandwidth challenges with agility and heart.

Topics: Artificial Intelligence, Strategic Management
1:00 - 1:50 PM

[1 CPE] Paradise Lost: Leave Hackers Stranded with Automated Microsegmentation

  Presented by Bryan Ward, Customer Engineer • Zero Networks

Flat networks and overly permissive accounts are paradise for cyber attackers. With defenses stuck on island time while hackers work overtime, traditional network security methods lag behind modern threats. This interactive session will outline the real-world strategies a top 10 US credit union leveraged to:

  • Proactively block ransomware and sophisticated threats
  • Streamline regulatory compliance for improve audit results
  • Eradicate manual tasks like tagging, grouping, and policy creation
  • Dynamically secure privileged ports
  • Accelerate microsegmentation and Zero Trust, avoiding a multi-year project

Don't miss this opportunity to explore proven and practical applications of microsegmentation to modernize cybersecurity strategy. Turn your network from a beach vacation into a desert island for hackers – learn how to leave attackers stranded in record time with automated microsegmentation.

Topics: Infrastructure
2:00 - 2:50 PM

[1 CPE] Surfing the Different Waves of AI

  Presented by Tyler Stuart, Sales Engineer, Trellix • Cyberuptive

Riding the ever-breaking wave of AI security model evolution can feel like a gnarly wipeout. This presentation will help your security team hang ten by navigating the diverse swells of Language Learning Models (LLMs), paddling through the currents of Retrieval-Augmented Generation, and catching the perfect set of Agentic AI. Our goal is to provide the knowledge you need to confidently choose and manage the right boards – I mean, tools – for your organization's security lineup.

Topics: Artificial Intelligence

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Michael Agtunong
Manager, Information Technology
Gather Federal Credit Union

Rose Alcuran
Vice President, Information Technology
Hawaii USA Federal Credit Union

Sylvester Apiki
Director, Information Systems, Technology
Molokai Ohana Health Care

Brad Bishop
Manager, Information Technology
Alaka’i Mechanical

Joe Braceros
Director, Information Technology
Waikiki Health

Nate Chang
Director, Client Services
Punahou School

Cody Down
Chief Information Officer, Vice President
Hawaii Pacific University

Tammy Earle
Manager, Information Technology
YMCA of Honolulu

Ryan Field
Executive VP IT, CISO
Bank of Hawaii

Chris Hart
Project Manager, IT Security
Hawaii Pacific Health

Kurt Higuchi
Director, Information Security
The Queen’s Medical Center

Vince Hoang
Chief Information Security Officer
State of Hawaii

Kyle Izumigawa
Director, IT Operations
Hawaiian Telcom

Darren Lee
Director, Information Technology
University of Hawaii Foundation

Addie Lui
Director, Information Security
Aloha Pacific Federal Credit Union

Michael Marcum
Manager, Information Technology
US Army Corp of Engineers Enterprise

Sean McCully
Controller & CIO
Office Pavilion Hawaii

Scott Mellon
Manager, IT End User Services & Support
The Queen’s Health Systems

Ben Mendes
Chief Information Officer
Hawaii State Federal Credit Union

Dana Mendoza
Director, Information Technology
VIP Food Service

Geoff Milford
Cybersecurity Engineer
Hawaii Pacific Health

Tim Minick
AVP, Director, Cybersecurity Risk Management
Pacific Guardian Life

Beau Monday
Chief Information Security Officer
Punahou School

Grant Nakamichi
Manager, IT Infrastructure
Aloha Pacific Federal Credit Union

Henderson Nuuhiwa
Chief Information Officer
Honolulu Board of Water Supply

Chris Robinson
VP, Cybersecurity Director
Finance Factors Ltd

Cassie Stelow
Director, Information Technology
Pacific Disaster Center

Tony Velasco
IT Division Chief
City & County of Honolulu, HI

Dwight Victor
Systems & Network Team Lead
General Dynamics Mission Systems

Troy Villar
Director, Information Technology
Child and Family Services

Charissa Wong
Manager, Information Technology
Bowers + Kubota Consulting

Alan Yamashiro
Information Security Project Manager
Hawaii Pacific Health

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

SILVER SPONSORS

Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
Converge Technology Solutions

Converge Technology Solutions

Converge Technology Solutions
Converge Technology Solutions Corp. is a North American software-enabled, Hybrid IT Solution Provider focused on delivering industry leading solutions and services. Converge’s regional sales and services organizations deliver advanced analytics, cloud, cybersecurity, and managed services offerings to clients across various industries.
Visit Website
Cyberuptive

Cyberuptive

Cyberuptive
Cyberuptive is a full-service international cybersecurity consulting firm based in Hawaii. With analysts positioned nationwide, they offer around the clock services that include CMMC compliance, managed SOC services, and cybersecurity program development.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface & the power to take on the ever-increasing performance requirements of the borderless network – today and into the future.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website
Stellar

Stellar

Stellar
Our mission is to make migrating to the cloud easier for enterprises than ever before. The cloud isn't just for people with massive development teams that can re-architect enterprise apps to make moving to a big-name public cloud cost-effective. At Stellar, we want to bring the power of cloud computing to everyone and help our customers worry less about IT infrastructure.
Visit Website
Torq

Torq

Torq
Torq is leading the way in hyperautomation–the ability to rapidly identify, vet, integrate, and automate as many business and IT processes as possible. We’re addressing a critical need in the modern cybersecurity portfolio. Torq emancipates security teams from manually managing threat detection and remediation at scale, and ensuring all of their systems are talking to each other, and working together in concert.
Visit Website
Vicinity

Vicinity

Vicinity
Vicinity is your local Technology Service Provider. Whether a local organization needs help with a technical issue, is looking to upgrade their IT infrastructure, or wants to explore new technology options, our team of experts is available to provide support and guidance.
Visit Website
Zero Networks

Zero Networks

Zero Networks
Zero Networks delivers automated microsegmentation, securing assets on-prem, in the cloud, and OT/IoT. Deploy in 30 days with set-and-forget simplicity.
Visit Website

BRONZE SPONSORS

HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
Netskope

Netskope

Netskope
Netskope, a global SASE leader, helps organizations apply zero trust principles and AI/ML innovations to protect data and defend against cyber threats. The Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Learn how Netskope helps customers be ready for anything on their SASE journey, visit netskope.com.
Visit Website
Spectrum Business

Spectrum Business

Spectrum Business
Spectrum Business® delivers a complete portfolio of secure connectivity solutions for small and mid-market businesses and caters to the unique needs of large businesses, communications service providers and government entities. Our industry-leading experts align our products to the needs of each customer, drawing from our full suite of services including internet solutions over hybrid fiber-coax and 100% fiber, video and voice solutions including phone and mobile, as well as unified communications and managed services tailored for our mid-market and large enterprise customers.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website
Verizon

Verizon

Verizon
We create connections that advance global business opportunities and enrich lives. Despite the challenges of today’s rapidly changing environments, the right technologies can help drive growth and performance, as well as improve the customer experience.
Visit Website
World Wide Technology

World Wide Technology

World Wide Technology
World Wide Technology (WWT) WWT, a $20B, privately held technology solutions provider leading the AI and Digital Revolution, has over 30 years of experience helping the world's largest organizations make the right technology decisions faster. Commercial enterprise, public sector and service provider clients work with WWT from strategy to execution bolstered by hands-on access to cutting-edge capabilities across infrastructure, data and AI, security, cloud and more through the Advanced Technology Center.
Visit Website

EXHIBITORS & ASSOCIATIONS

ARMA Hawaii

ARMA Hawaii

ARMA Hawaii
ARMA International provides education and networking opportunities to information professionals to enable them to use skills and experience to leverage the value of records and knowledge as corporate assets and as contributors to organizational success.
Visit Website
ASIS Hawaii

ASIS Hawaii

ASIS Hawaii
ASIS International is the preeminent organization for security professionals. Founded in 1955, ASIS is dedicated to increasing the effectiveness and productivity of security professionals.
Visit Website
CVE Technologies

CVE Technologies

CVE Technologies
CVE Technologies Group is a Juniper authorized, Master Specialized in Collaboration and Security, with Network, Data Center, IT Solutions.
Visit Website
CyberHawaii

CyberHawaii

CyberHawaii
CyberHawaii is an information sharing and analysis non-profit organization committed to developing and enhancing Hawaii’s cybersecurity capabilities. The organization is working to build a community that manages and mitigates cyber risk through various methods.
Visit Website
Delinea

Delinea

Delinea
Seamless, intelligent, centralized authorization to better secure the modern enterprise. The Delinea Platform enables you to discover all identities, assign appropriate access levels, detect irregularities, and immediately respond to identity threats in real-time.
Visit Website
DRFortress

DRFortress

DRFortress
DRFortress is the largest and the only carrier-neutral data center and cloud marketplace operating in Hawaii. Experience the operational reliability, scalability, and security that DRFortress provides for all your mission-critical IT systems.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
HPE Juniper Networking

HPE Juniper Networking

HPE Juniper Networking
Juniper Networks is now part of HPE. Together, we're building industry-leading, secure, AI-native networks – purpose-built with and for AI. As AI and networking converge, we're driving a bold transformation across enterprises, service providers, and cloud operators.
Visit Website
IBM

IBM

IBM
For more than a century, IBM has been a global technology innovator, leading advances in AI, automation and hybrid cloud solutions that help businesses grow.
Visit Website
InfraGard Hawaii

InfraGard Hawaii

InfraGard Hawaii
InfraGard is a partnership between the FBI and the private sector. It is an association dedicated to sharing information and intelligence to prevent hostile acts against the U.S.
Visit Website
ISACA Hawaii

ISACA Hawaii

ISACA Hawaii
Aloha and welcome to the ISACA Hawaii Chapter. The aim of the Chapter is to sponsor educational seminars, workshops, conduct chapter meetings, and help promote and elevate the visibility of the IS audit, control and security profession throughout the area.
Visit Website
ISC2 Hawaii

ISC2 Hawaii

ISC2 Hawaii
The International Information Systems Security Certification Consortium, Inc., (ISC)², is the global, not-for-profit leader in educating and certifying information security professionals throughout their careers.
Visit Website
ISSA Hawaii

ISSA Hawaii

ISSA Hawaii
Welcome to ISSA's Hawaii Chapter, a group of information security professionals devoted to providing educational forums, publications and peer interaction opportunities that enhance the knowledge skills and growth of its members.
Visit Website
MC3 Technologies

MC3 Technologies

MC3 Technologies
With decades of experience building, supporting, and integrating systems, including more than 20 years of experience working with the Department of Defense and within the federal and commercial security industries, MC3 Technologies can guide you and your company through your IT modernization and cybersecurity initiatives.
Visit Website
MSPAA

MSPAA

MSPAA
The MSP Association of America (MSPAA) has been established with three primary missions, each of which follows a unique trajectory aimed at providing our clients, members, and students with a collaborative and informative pathway towards building a future for technology, business, and education.
Visit Website
PMI Hawaii

PMI Hawaii

PMI Hawaii
PMI is the world's leading not-for-profit membership association for the project management profession. PMI Honolulu's mission is to promote the project management practice and profession through networking, sharing of project experiences, training, education, and certification in the State of Hawaii.
Visit Website
Ruckus Networks

Ruckus Networks

Ruckus Networks
Ruckus Networks is redefining connectivity around the globe. We build secure wired and wireless access networks for organizations that place a premium on connectivity experiences for end-users as well as simplicity and lower-cost-per-connection for IT.
Visit Website
ServiceNow

ServiceNow

ServiceNow
ServiceNow is changing the way people work. ServiceNow provides service management for every department in the enterprise including IT, human resources, facilities, field service and more.
Visit Website
Silverfort

Silverfort

Silverfort
Identity infrastructure is siloed, but identity security doesn’t have to be. Discover and protect every dimension of identity, everywhere. Human or machine, cloud or on-prem.
Visit Website
Trellix

Trellix

Trellix
Trellix brings you a living XDR architecture that adapts at the speed of threat actors and delivers advanced cyber threat intelligence. We're changing what security means and what it can do, giving everyone in your organization the confidence that comes with being more secure, every day.
Visit Website
Unified Security Partners

Unified Security Partners

Unified Security Partners
Unified Security Partners is a locally owned security partner located on Oahu and serving all of the Hawaiian Islands. Our team is proud to be a top trusted Verkada authorized sales and installation partner with experience dating back to 2019.
Visit Website
Verkada

Verkada

Verkada
Verkada provides cloud-managed security solutions—video surveillance, access control, alarms, and more—designed to simplify physical security and deliver real-time insights for safer, smarter buildings.
Visit Website
Zoom

Zoom

Zoom
At Zoom, we set ambitious goals for rapid innovation. Our evolution from a video meetings software company into an AI-first open work platform built for human connection has never been more evident than today. We’ve helped our customers accelerate their productivity, reimagine teamwork, and create exceptional customer experiences with Zoom AI Companion, Zoom Workplace, Business Services, and Industry Solutions. As we enter into a new era with agentic AI, we’re committed to innovation that will help you get more done, do your best work, and strengthen relationships.
Visit Website

Interested in becoming part of our next Honolulu event?

CONTACT US FOR INFO

Honolulu

Sheraton Waikiki
Kauai / Maui Ballroom
2255 Kalākaua Avenue
Honolulu, HI 96815

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.