F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Kansas City 2019 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

July 18th, 2019
8:30am – 4:30pm

Overland Park Convention Center
Ballrooms A-C
6000 College Boulevard
Overland Park, KS 66211

Directions & Parking

KEYNOTE: The Oprah Effect: Giving Away Free Cars To All Attendees

  Presented by Randy Stone • Director, Stroz Friedberg DFIR

Seminar Schedule

VIEW FLOORPLAN
  • Theater One
  • Theater Two
  • AM Sessions
  • PM Sessions
  • Keynote
9:00 - 9:50 AM

Active Directory Security: Early Stage Attack Activities to Watch For

  Presented by STEALTHbits Technologies

Attackers have demonstrated a consistent and ongoing ability to obtain access to workstations inside the network boundary through phishing and other web and email attacks. From here, attackers set their sights on gaining control of Active Directory as a means to an end; compromising Active Directory is an easy way to gain access to all critical corporate data and resources. Darin will discuss two early stage attack activities: LDAP reconnaissance and Password Spraying – that allow attackers to move laterally inside your AD environment. Detection strategies and mitigation steps will also be explained.

Topics: Information Security
10:00 - 10:50 AM

Exploitation of IT Vulnerabilities is Escalating

  Presented by Quest Software

Cybercriminals are savvier than ever. They understand that IT complexities create serious vulnerabilities, and these criminals are continually developing new ways to breach your organization's boundaries. That is why a proactive, unified endpoint management (UEM) strategy should be part of your organization's core business strategy.

Topics: Information Security, Strategic Management
11:00 - 11:50 AM

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today's businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Topics: Information Security
12:10 - 12:50 PM

DoD Supply Chain Security: Stealing Stealth and the Nuclear Option

  Presented by Jeffrey L. Westeman • CSCP; VP of Programs, Air Capital Chapter of AFCEA

The integrated supply chains we rely upon to manufacture stealth aircraft, build submarines, and design new weapon platforms to protect our country are at risk from threat actors who exploit the connectivity of our global distribution systems to steal intellectual property, allowing nation states to modernize their economies, advance their military capabilities, and weaken U.S. global influence. We'll review the history and reasoning behind the contractual requirements for cyber security at defense contractors as detailed in Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012, and outline steps your organization must take to adequately safeguard controlled, unclassified information (CUI) as specified by NIST800-171, "Protecting CUI in Nonfederal Information Systems and Organizations". We'll also discuss MITRE's 2018 "Deliver Uncompromised" report and how the recommendations will reshape future defense acquisitions.

The presenter for this workshop is Jeffrey Westeman, CSCP, VP of Programs for Air Capital Chapter of AFCEA. Mr. Westeman has over 35 years of experience in information technology, security operations, supply chain management, and manufacturing. He has presented or provided training for various organizations, including Boeing Defense, Boeing Commercial, Spirit AeroSystems, Sikorsky, Cessna, Triumph Group, INFOR, APICS, Institute of Internal Auditors Association (IIA), and Wichita State University.

1:00 - 1:50 PM

Welcome to the New Age of Converged Data Protection

  Presented by StorageCraft

Managing storage continues to be complex, and often expensive. Something needs to change, and it certainly won't be a dramatic increase in staffing. Fortunately, object storage is the answer. By eliminating the use of legacy RAID, object storage, can be the foundation for a scale-out converged storage solution that solves both data protection and primary storage challenges. Want to recover a multi-TB VM in less than a second? No problem. Want to protect files from ransomware? No problem. Need an enterprise file serving, archiving, or virtual server storage solution? No Problem. Attend this session to learn how object storage is changing the landscape for IT admin and the technology of the future.

Topics: Data Storage
2:00 - 2:50 PM

Want to Advance Your Career? Start with Your Community

  Moderated by INTERFACE Kansas City Advisory Council

The old adage says that "it takes a village" and this is true, even for your career. Are you taking advantage of the community around you? Kansas City's IT community is growing larger by the day with multiple associations/groups leading the way. With so many to choose from, how do you know what group is right for you? Join us for a conversation about the IT associations that make up the community. Discover what opportunities you may be missing, how you can be a part of KC's IT community, and find new ways to grow as a professional.

Moderator:

  • Jeffery Wheat • Board Member; InfraGard

Panelists:

  • Donna Gomez • Security Risk and Compliance Analyst; Johnson County Government/President; ISACA Greater Kansas City Chapter
  • Raj Bhatia • VP of Marketing; Project Management Institute (PMI)
  • Naeem Babri • President; Information Systems Security Association (ISSA)
  • Marc Vasquez • President; International Association of Security Awareness Professional (IASAP)
  • Cheryl Cooper • Founder and President; Women in Security Mentors (WinS)
Randy StoneRandy StoneDirector, Stroz Friedberg DFIR
3:00 - 3:50 PM

The Oprah Effect: Giving Away Free Cars To All Attendees

  Presented by Randy Stone • Director, Stroz Friedberg DFIR

How do you solve a crime when you have thousands of international witnesses that speak dozens of languages and each hold only tiny pieces of the puzzle? All the while, each hour that passes, could be costing an organization millions? This is the dilemma that IT security professionals face. A lot of lip service is given to IT security and incident response, but how much of your preparation is theory and how well practiced are you for when something happens? Join Randy Stone for a no-holds-barred discussion on the dos and don'ts of incident response, diving into his experience, first in law enforcement forensics and later as an incident response professional. Discover actionable ways to respond to incidents and avoid being blindsided should disaster strike.

Randy is a Director with the Stroz Friedberg Incident Response Team, investigating and managing intrusion and malware investigations worldwide. As a consultant for corporate Incident Response, Randy has had the opportunity to apply his forensic and security skills in the corporate environment for clients of Stroz Friedberg, Dell SecureWorks and IBM. Randy's broad background in investigative techniques has helped him successfully complete difficult investigations in numerous engagements worldwide, including intrusions, malware infections, enterprise-wide ransomware and nation-state attacks.

Prior to his current work of corporate Incident Response, Randy was a police officer with the Wichita (Kansas) Police Department for 23 years, 12 of which were spent as a Detective in computer forensics and computer crime investigations. Randy was an original member of the Forensic Computer Crime Unit (FCCU) and designed the original team structure and mission. During his law enforcement career, he conducted computer forensic examinations for hundreds of cases including capital murder, the BTK serial killer, child exploitation, cyber stalking, financial crimes and numerous other cases. He has received awards from the FBI and the High Technology Crime Investigation Association (HTCIA) for his computer forensic investigations and has testified in Federal and State courts as a fact and expert witness.

  • AM Sessions
  • PM Sessions
9:00 - 9:50 AM

IT vs IS: How to Make Pineapples Work on a Pizza

  Presented by INTERFACE Kansas City Advisory Council

As technology becomes increasingly important to an organization's success, the number of roles in the field have increased, often creating blurry distinctions between responsibilities. These gray lines can cause conflict within the company when they aren't properly managed. Join the Advisory Council as we discuss the relationship between IT and IS (Info Sec), where they overlap, where they differ and how to get the most out of working together without stepping on people's toes.

Moderator:

  • Keith Shaw • President; ISC2

Panelists:

  • Rich Graham • Senior Manager, Cybersecurity & Privacy; PwC
  • Eric Baer • Chief, Information Technology Operations; USDA Risk Management Agency
  • Rick Derks • Chief Security Officer; FCS Financial
  • Britney Hommertzheim • Director of Information Security; AMC Theaters
10:00 - 10:50 AM

Architecting the New SD-WAN Edge for the Cloud-first Enterprise

  Presented by Silver Peak

Adoption of cloud services has driven enterprises to re-think WAN architecture. Architectures based on traditional, manually-programmed routers can't keep pace. A business-driven SD-WAN can provide secure direct connections from the branch to SaaS/IaaS across the internet, significantly increasing application performance resulting in a superior end-user QoEx (Quality of Experience). By integrating SD-WAN, WAN optimization, routing and security in a single unified platform, enterprises can simplify branch WAN edge architecture, accelerating time to value and dramatically reducing operational costs. From a centralized SD-WAN orchestrator, application priorities and QoS and security policies may be configured and assigned to automate traffic handling across the WAN. A single mouse click distributes SD-WAN configuration parameters to all sites, improving operational efficiency and minimizing the potential for human errors that can negatively impact application availability and enterprise security. This session will describe why SD-WAN adoption continues at a breakneck pace because of the user productivity, agility and cost savings benefits that a business-driven SD-WAN delivers.

Topics: Information Security, Infrastructure
11:00 - 11:50 AM

Welcome to the New Age of Converged Data Protection

  Presented by StorageCraft

Managing storage continues to be complex, and often expensive. Something needs to change, and it certainly won't be a dramatic increase in staffing. Fortunately, object storage is the answer. By eliminating the use of legacy RAID, object storage, can be the foundation for a scale-out converged storage solution that solves both data protection and primary storage challenges. Want to recover a multi-TB VM in less than a second? No problem. Want to protect files from ransomware? No problem. Need an enterprise file serving, archiving, or virtual server storage solution? No Problem. Attend this session to learn how object storage is changing the landscape for IT admin and the technology of the future.

Topics: Data Storage
12:10 - 12:50 PM

Birds of a Feather

  Presented by Advisory Council

Want an opportunity to discuss in small groups and learn from other attendees? Join your fellow attendees in informal round table discussions on a variety of IT topics. Several lunch tables will have designated topics. Look for the "Birds of a Feather" topic signs to join the conversation. Tables will be located just outside of the theaters.

Topics include:

  • Data Privacy
  • Business Continuity Planning
  • Cyber risk as an element of ERM
  • Agile
  • Transition to Cloud
1:00 - 1:50 PM

What the WAF? Deploying Web Application Firewalls in a Cloud-Centric World

  Presented by Critical Start

With the move to DevOps and the cloud, how do you get value from a WAF? Maybe you're not seeing the value from your current solution? Join us as we discuss the history of WAFs, the need for a modern take on a classic technology, and how to apply it to a cloud-centric world.

Topics: Information Security
2:00 - 2:50 PM

If You Don’t Protect the Key, Don’t Encrypt the Data

  Presented by nCipher Security

For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the same amount of time, the keys used to perform the encryption have been the weakest link in the chain. After 2000 years, technology has advanced such that the keys can be protected but many companies don’t understand how important it really is. Mr. Beutlich will explain in an entertaining (and sometimes graphic) fashion why protecting the encryption key is more important than the encryption itself.

Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Travis Anderson
IT Tech
USD 204: Bonner Springs School District

Naeem  Babri
Risk Manager/President
Sprint/ISSA

Eric Baer
Chief, Information Technology Operations
US Dept of Agriculture – RMA

Jason Baity
Manager, Information Technology
KanEquip

Nancy Baker
IT Assistant Director
University of Kansas

Kip Ballinger
Sr. Cyber Security Specialist
Leidos

Lora Baugher
Director, Information Technology
Village Shalom, Inc.

Shaun Bender
VP, Mobile Operations
Sullivan Law Firm

Jeff Blackmon
Business Continutiy Consultant
Strategic Continuity Solutions

Richard Borlaza
Director, Information Technology
Hyman Brand Hebrew Academy

Amy Botts
Manager IT Internal Audit
Hallmark Cards, Inc.

Caleb Christopher
President
Infosec Consulting

Loong Chung
Systems Architect
Garmin

Ken Clark
District Technology Director
USD 204: Bonner Springs School District

Terri Clark
Director, Technical Services
Kansas Legislature

Ben Clayton
Director of DevOps
Company Kitchen

David Daniel
Information Security Architect
Cerner

Rick Derks
Chief Security Officer
FCS Financial

John Dougherty
Director Technology Services
Unbound

Donna Gomez
President
ISACA Greater Kansas City Chapter

Rich Graham
Manager, Cybersecurity & Privacy
PricewaterhouseCoopers

Adrian Guerrero
Director of Operations
Kansas State Board of Nursing

Scott Harris
Information Security Officer
Lockton Companies

Britney  Hommertzheim
Director, Information Security
AMC Theatres

Brandi Kurtz
Compliance/Privacy and Security Strategist
Cerner

Michael Lehman
Executive Vice President & CIO
Fike Corporation

Eirick  Luraas
Sr GRC Security Analyst
Cerner

Chris Mann
CIO
DH Pace

Harry  Maroudas
Information Systems Security Office
USDA – Risk Management Agency

Anita Mosley
Information Technology Director
Wipro, LTD

Michael  Nixon
Director – Information Security
Stormont Vail Health

Nathan Powell
IT Administrator
Lewis Rice LLC

Rick Pressler
Manager, Information Technology
Heartland Coca-Cola

Stan Rumford
Manager, Information Technology
Exchange Bank & Trust

Jenya Sablin
Senior Manger, Information Technology
Black Knight Financial Services

Gary Schieber
Executive Director, Information Technology
Metropolitan Community College

BJ Smith
Head of Information Security
Seaboard Foods

Kara Speciale
BU Information Security Officer
SS&C/DST

Andrew Spidle
Director, Information Technology
Axcet HR Solutions

Albert Stadler
CIO/CISO
Missouri Southern State University

Ted Tartenaar
ITS Manager
Johnson County Park & Recreation District

Vernon Turner
ITS Operations Center Manager
Kansas State University

Altaf Uddin
Director, Information Systems
University of Kansas, School of Pharmacy

David Upsdell
SVP
Midwest Trust Company

Ivan Winfield
VP – IT/CIO
Seabord Corporation

Florian Yanez
Director, Information Security
Helzberg Diamonds

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

StorageCraft

StorageCraft

StorageCraft
Arcserve is a global top 5 data protection vendor with best-in-class solutions that manage, protect, and recover all data workloads, from SMB to enterprise and regardless of location or complexity. A 100% channel-centric organization, Arcserve has a presence in over 150 countries, with 19,000 channel partners and 235,000 customers.
Visit Website

SILVER SPONSORS

Critical Start

Critical Start

Critical Start
Critical Start Managed Cyber Risk Reduction solutions ensure continuous security monitoring and mitigation, delivering robust protection against threats. With our platform’s maturity assessments, event analytics, response capabilities, and a team of expert risk mitigators, achieve the highest level of cyber risk reduction and increase confidence in attaining desired security maturity.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
nCipher Security

nCipher Security

nCipher Security
nCipher Security, a leader in the hardware security module (HSM) market, empowers world-leading organizations by delivering trust, integrity and control to their business critical information and applications, IoT, blockchain and digital payments.
Visit Website
Quest Software

Quest Software

Quest Software
At Quest, we solve complex problems with simple solutions. Our philosophy is focused on great products, great service and being simple to do business with. We deliver technology that eliminates the need to choose between efficiency and effectiveness.
Visit Website
Silver Peak

Silver Peak

Silver Peak
Silver Peak, recently acquired by HPE Aruba, delivers networking software that powers a self-driving wide area network (SD_WAN) that learns and adapts to requirements of the business to ensure the highest levels of end user and application performance.
Visit Website
STEALTHbits Technologies 

STEALTHbits Technologies 

STEALTHbits Technologies 
STEALTHbits Technologies is a cybersecurity software company focused on protecting an organization’s sensitive data and the credentials attackers use to steal that data through Active Directory Security and Data Access Governance.
Visit Website

BRONZE SPONSORS

10ZiG Technology

10ZiG Technology

10ZiG Technology
10ZiG Technology is a world-market leader in Thin & Zero Client endpoint devices for VDI. 10ZiG offers Intel and AMD based Dual and Quad Core Thin & Zero Clients for VMware, Citrix, and Microsoft environments. Free demo devices are available at 10ZiG.com.
Visit Website
Eagle Technologies

Eagle Technologies

Eagle Technologies
Eagle offers products, services and support to provide our customers with the tools they need to meet their data center needs. Our areas of expertise include storage, data protection and management, virtualization, archive/compliance and cloud services.
Visit Website
FileWave

FileWave

FileWave
For over 20 years, FileWave has assisted business, education, and government customers to take control of their software deployments, providing granular control of all files in any installation, both pre and post-deployment.
Visit Website
Quadrant Information Security

Quadrant Information Security

Quadrant Information Security
Quadrant is a consulting firm committed to supporting organizations in all markets and protecting their sensitive data. Specializing in Managed Security Services, Quadrant prides itself on helping their customers maintain a secure environment.
Visit Website

EXHIBITORS & ASSOCIATIONS

ASIS Kansas City

ASIS Kansas City

ASIS Kansas City
ASIS International is the preeminent organization for security professionals. Founded in 1955, ASIS is dedicated to increasing the effectiveness and productivity of security professionals.
Visit Website
AWS Kansas City User Group

AWS Kansas City User Group

AWS Kansas City User Group
This group is for all current (and potential) users of Amazon Web Services. We'll talk about general cloud topics as they pertain to AWS such as security, scalability, architecture, etc.
Visit Website
Cavern Technologies

Cavern Technologies

Cavern Technologies
Located outside of Kansas City, Cavern Technologies, Inc. is a leading provider in the development, leasing and operation of build-to-suit, wholesale data centers.
Visit Website
Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
Comcast Business

Comcast Business

Comcast Business
Comcast Business has the largest IP network in the nation, serving small businesses through large enterprises. Technology offerings include Internet and Ethernet connectivity, voice solutions, and SD-WAN on ActiveCore(SM). Learn more at business.comcast.com/enterprise.
Visit Website
Concergent IT, a division of Underground Vaults & Storage

Concergent IT, a division of Underground Vaults & Storage

Concergent IT, a division of Underground Vaults & Storage
Concergent IT is a full-service data center and technology consulting firm committed to long lasting client relationships through innovative, timely service.
Visit Website
Consolidated Communications

Consolidated Communications

Consolidated Communications
Power up your business with fiber optic solutions like High-Speed Internet, Voice, DataCenter, Managed IT and Cloud Services from Consolidated Communications. “The Front Door to Your Business”
Visit Website
DAMA Kansas City

DAMA Kansas City

DAMA Kansas City
KC DAMA is a vibrant community of data professionals and business users sharing our experiences and learning from each other. We welcome you to join us.
Visit Website
Green House Data

Green House Data

Green House Data
Green House Data is a platform agnostic managed services provider who delivers hybrid solutions to enterprises who need secure IT environments and efficient management of their critical applications and business data. The company is a certified B-Corp.
Visit Website
GuidePoint Security

GuidePoint Security

GuidePoint Security
GuidePoint Security provides trusted cybersecurity consulting expertise, solutions, and services that help organizations make better decisions and minimize risk.
Visit Website
InfraGard Kansas City

InfraGard Kansas City

InfraGard Kansas City
InfraGard is a non-profit organization set up nationally by the FBI to create a forum for public and private organizations to work together in an effort to secure our homeland's Infrastructure and Key Resources (CI/KR).
Visit Website
ISACA Kansas City

ISACA Kansas City

ISACA Kansas City
The ISACA KC Chapter was founded in 1984 and continues to promote the education of individuals relating to the auditing of, management consulting in, or direct management of the fields of IT governance, IS audit, security, control and assurance.
Visit Website
ISC2 Kansas City

ISC2 Kansas City

ISC2 Kansas City
ISC²®, is the global, not-for-profit leader ineducating and certifying information security professionals throughout theircareers. We are recognized for Gold Standard certifications and world class education programs.
Visit Website
ISSA Kansas City

ISSA Kansas City

ISSA Kansas City
Through its membership, ISSA -Kansas City helps security professionals in the Kansas City area learn of information security issues and trends, which promote education, collaboration, and leadership, and further the information security profession.
Visit Website
KC Tech Council

KC Tech Council

KC Tech Council
The KC Tech Council represents Kansas City’s tech industry, a diverse ecosystem anchored by multinational corporations and driven by innovative entrepreneurs, with industry footholds in healthcare IT, telecommunications, digital media and more.
Visit Website
PMI Kansas City

PMI Kansas City

PMI Kansas City
Our chapter is comprised of project management professionals and others interested in project management in and around Kansas City.
Visit Website
RakworX

RakworX

RakworX
RakworX manufactures high-quality data center infrastructure products which provide security, power distribution, and airflow management wherever data is created, processed, transmitted and stored.
Visit Website
SecKC

SecKC

SecKC
SecKC is dedicated to supporting the local Kansas City InfoSec community by providing a regular meeting space to share knowledge, collaborate on projects, share tools, and grow as a group.
Visit Website
Spectrum Business

Spectrum Business

Spectrum Business
Spectrum Business® delivers a complete portfolio of secure connectivity solutions for small and mid-market businesses and caters to the unique needs of large businesses, communications service providers and government entities. Our industry-leading experts align our products to the needs of each customer, drawing from our full suite of services including internet solutions over hybrid fiber-coax and 100% fiber, video and voice solutions including phone and mobile, as well as unified communications and managed services tailored for our mid-market and large enterprise customers.
Visit Website
TRIPWIRE

TRIPWIRE

TRIPWIRE
Tripwire delivers advanced threat, security and compliance solutions used by over 9,000 organizations, including over 50% of the Fortune 500. Tripwire enables enterprises around the world to detect, prevent, report and respond to cyber security threats.
Visit Website
VMUG

VMUG

VMUG
Officially launched in August of 2010, the VMware User Group (VMUG) is an independent, global, customer-led organization, created to maximize members’ use of VMware.
Visit Website
Women in Security Kansas City

Women in Security Kansas City

Women in Security Kansas City
Our vision for Women in Security, Kansas City, is to inspire and support women at all career levels in Information Security. We provide focus for women in Information Security with peer mentoring, workshops, and networking opportunities.
Visit Website
Women In Security Mentors

Women In Security Mentors

Women In Security Mentors
WinS provides security awareness training and promotes the advancement of minority youth and women in cybersecurity careers across business, schools, youth programs and government programs.
Visit Website
WorkSafe Technologies

WorkSafe Technologies

WorkSafe Technologies
WorkSafe Technologies is a leading authority in seismic protection. WorkSafe Technologies' ISO-Base seismic isolation technology is the most effective way to protect mission-critical and expensive electronic equipment in the event of an earthquake.
Visit Website

Interested in becoming part of our next Kansas City event?

CONTACT US FOR INFO

Kansas City

Overland Park Convention Center
Ballrooms A-C
6000 College Boulevard
Overland Park, KS 66211

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.