F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Kansas City 2022 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Kansas City EVENTS

AT A GLANCE

June 9th, 2022
8:30am – 4:30pm

Overland Park Convention Center
Ballrooms AB
6000 College Boulevard
Overland Park, KS 66211

Directions & Parking

Venue Accessibility

Venue Health & Safety

KEYNOTE: [1 CPE] The Good, the Bad, and the Ugly of Vetting Applications

  Presented by Eric Walters • Chief Information Security Officer, Burns & McDonnell

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Theater Three
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Stopping Attacks, Not Your Business: AI & Autonomous Response

  Presented by Darktrace

With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join this session to explore the benefits of Autonomous Response as a must-have that goes beyond ‘defense,’ including real-world threat finds and attack scenarios.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Infrastructure Modernization: Your Foundation for Innovation and Business Agility

  Presented by Hitachi Vantara

Today’s infrastructure must be engineered to support digital innovation, such as accelerating your cloud, applications, and data. The agility, efficiency, and resilience required for new workloads, applications, and requirements are needed for a modernized infrastructure. Join us as we guide you on your infrastructure, application, and data modernization journey so that you can make smart modernization decisions and build Your Cloud, Your Way.

Topics: Infrastructure
11:00 - 11:50 AM

[1 CPE] Navigating Today’s Threat Landscape: A Current State of Cybersecurity

  Presented by Fortinet

Join this session for a comprehensive look at the current state of cybersecurity. Today’s ever-evolving threat landscape requires an integrated, automated approach to security. Learn how you can mitigate risk in your organization, optimize your security team’s operations, and gain best practices to integrate and consolidate your security tools; whether you’ve taken a multi-vendor or single-vendor approach.

Topics: Information Security
12:00 - 12:50 PM

[1 CPE] Data Literacy: No One is Data Literate. No One.

  Presented by John Ladley • Data Governance Author & EIM Leader

The new topic of the year is data literacy. In this session, you will learn how to use education to increase data literacy at all levels to reduce the mismanagement of data. Topics that will be covered include:

  • Fundamentals of data – leadership, management, and all areas of organizations need to accept that they need to understand some new things. No one is data literate.
  • Acting accordingly – where are we not acting correctly and how do we fix it.
  • What do I need to do – this starts with the individual.

From there, John will offer some practical steps to acquire true engagement and data literacy in the process.

John Ladley is a highly experienced practitioner, advisor, and advocate for organizations looking for sustainable value from information and data. His experience and knowledge are balanced between treating data assets as an essential component of modern business and economies, and the practical solution to business problems.

His books are the authoritative sources for data and information management and data governance. He is a recognized authority and speaker on enterprise information management, including data monetization, information and data architectures, data governance, MDM, data quality, business intelligence and analytics, data warehouse, and knowledge management. John is sometimes called the "senior statesman of data." Currently, John is semi-retired and works with clients as an advocate for data governance and management and as a mentor to organization leadership.

Topics: Data Management
1:00 - 1:50 PM

[1 CPE] Disrupting the Means to Prevent the End: A Guide to Detecting Ransomware

  Presented by Red Canary

Ransomware has been a dominant cybersecurity threat for the better part of the last decade. However, it doesn’t walk alone. It’s almost always the eventual payload delivered by earlier-stage malicious software or activity. Luckily, if you can detect the threats that deliver the ransomware, you can stop the ransomware before it arrives.

In this talk, we’ll extensively reference Red Canary’s 2022 Threat Detection Report, examining the malware and other malicious tools that adversaries often use to deliver ransomware. While the specific trojans and strains of ransomware may change from one attack to the next, adversary tactics, techniques, and procedures are often similar across campaigns and threats. By developing robust detection coverage for the techniques adversaries abuse most often, rather than focusing on individual threats, security teams can achieve defense-in-depth against the many threats that leverage those techniques and the broader trends that dominate the infosec landscape.

Want to learn more about the prevalent adversary techniques and threats that can lead to a ransomware infection? Attendees will leave with:

  • A better understanding of the threats and tools that commonly precede a ransomware infection
  • Guidance on relevant collection and data sources that offer visibility into the threats and techniques that adversaries use to deliver ransomware
  • Actionable information on how security teams can develop the capacity to detect, prevent, and mitigate ransomware and other threats
  • Strategies for testing their ability to observe and detect common threats with free and easy-to-use tools like Atomic Red Team
Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Chasing Cloud Security Maturity Amid Constant Headwinds of Change

  Presented by Check Point

Covid and the push to accelerated ‘remote first’ strategies have forced organizations to leverage on-demand cloud infrastructure, often without the proper design, architecture, and security strategy in place to scale safely. In addition, infrastructure as a service providers are innovating very quickly and building high-value services for us to leverage in our application architectures. Lastly, we are challenged more than ever by a lack of mature cloud skillsets available to hire. These factors add up decisions with resources, identities, and access that put our most sensitive secrets at risk. As new and innovative cloud capabilities are introduced, so too are security innovations, both in technology and process.

Grant Asplund, Growth Technologies Evangelist, will discuss the evolution of Cloud security including headwinds, issues, challenges, and concerns companies can expect to be confronted with as they pursue reaching security maturity in the Cloud.

Topics: Information Security, Infrastructure
Eric WaltersEric WaltersChief Information Security Officer, Burns & McDonnell
3:00 - 3:50 PM

[1 CPE] The Good, the Bad, and the Ugly of Vetting Applications

  Presented by Eric Walters • Chief Information Security Officer, Burns & McDonnell

What level of access are applications requesting and then receiving directly from your employees? Is the security team aware? Has the risk been quantified? Who is looking at the application Terms and Conditions or the End User License Agreement? Is the access overly permissive? What happens if the application vendor is hacked? Can the attacker access your data? Is the vendor liable?

Eric Walters, CISO and Director of IT Operations at Burns & McDonnell, will discuss these and many more perils and pitfalls of vetting applications and plugins.

Eric Walters is a seasoned information technology leader with over 25 years of security experience. He is capable of translating IT details into executive-level business decisions. Eric believes good compliance does not mean good security, nor does good security mean good risk management. Passionate for employee development. His experience includes healthcare compliance, software development, information security program management, cyber security managed services, global transition operations, infrastructure cloud operations, enterprise architecture, and document management, and is a retired Marine Officer.

Topics: Business Continuity / Disaster Recovery, Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] The Future of Observability

  Presented by Cribl

Digital transformations, cloud migrations, and persistent security threats turned observability from a niche concern to an essential capability in today’s organizations. We’re still in the early days of observability maturity, but early stumbles point to where observability must go in the future. This talk discusses where observability is today and the three critical areas necessary for observability to deliver on its promises throughout the enterprise.

Topics: Information Security, Infrastructure
10:00 - 10:50 AM

[1 CPE] The State of the Cyber Insurance Market: How to Plan for Uncertain Future

  Presented by Arctic Wolf

Organizations have come to rely on cyber insurance to mitigate the impact of increasingly sophisticated, disruptive, and widespread cyber-attacks. As a result, insurers are issuing more policies, and the amounts of protection available are increasing. In 2020, the global insurance community saw the first cyber insurance program that exceeded $1 billion in coverage.

Join this session to hear why:

  • Insurers are rethinking cyber coverage and claims in the wake of increasingly aggressive cyber-attacks.
  • Businesses are likely to see their cyber insurance premiums increase, or even see some cyber security coverage dropped entirely.
  • Leaders should consider risks and mitigation strategies as they assess their readiness and liability when it comes to breaches or attacks.
Topics: Information Security
11:00 - 11:50 AM

[1 CPE] The Future of Object Storage: Where Do We Go from Here?

  Presented by Hitachi Vantara

While object storage has surged in popularity as an alternative to NAS due to the technological limitations of NAS, customers are now pushing the limits of object storage as well. Where do we take the technology from here to remain relevant and continue to address the needs of modern AI and ML workloads? We will look at the roots of object storage and what needs to happen to the technology to continue forward with today’s modern workloads. Using flash technology and highly parallelized workloads, we will take an in-depth look at some of the directions we expect the unstructured data storage landscape to take. Do we see a world of all flash storage leading the pack or will we continue to utilize hybrid technologies to optimize the economics of storage? Join us for an in-depth look at the current landscape of unstructured data storage and where we go from here to address modern data workloads.

Topics: Data Storage
1:00 - 1:50 PM

[1 CPE] Digital Transformation is Built on a Foundation of APIs – But are Your APIs Secure?

  Presented by 42Crunch

APIs are the core building block of every enterprise’s digital strategy, yet they are also the number one attack surface for hackers. Traditional security and management approaches are failing every day as the scale and reach of API attacks increase. The time is now right for enterprises to consider a new end-to-end continuous approach to protecting their APIs. In this talk, you will learn how Global 2500 enterprises are embracing a positive security model combining shift-left and shield-right methodologies to protect their APIs throughout the API lifecycle.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Panel Discussion: The More Things Change…

  Presented by INTERFACE Advisory Council

For the last two years, there has been no shortage of change in how IT departments are organized. The structure in your shop likely looks nothing like it did in 2019. With the permanence of remote work, how have you evolved? Has your company kept up with the new landscape?

Please join the INTERFACE Kansas City Advisory Council for a discussion on the current landscape of leadership in the IT industry. We’ll discuss retaining employees, hiring workers remotely, dealing with the “great resignation,” and other topics of relevance to your IT career. Finally, the panel will address the challenge of keeping local Kansas City IT talent from exploring remote opportunities with out-of-state companies. Bring your questions for this open conversation with area leaders who will share their experiences and insights.

  • Britney Kennedy, Business Information Security Officer, Cardinal Health
  • Michael Nixon, Director, Information Security, Stormont Vail Health
  • Altaf Uddin, Director, Information Systems, University of Kansas School of Pharmacy
  • Adam Wasserman, Director, Information Technology, Paris Brothers
Topics: Culture
  • Sessions
10:00 - 10:50 AM

[1 CPE] Educating Your Guesses: How to Quantify Risk and Uncertainty

  Presented by Novacoast

Asking for a budget and justifying spending in cybersecurity departments can be a difficult task due to limited data and high uncertainty of future events. This talk will dive into quantitative risk analysis as it relates to cybersecurity: how to model uncertain events and understand financial risk. Attendees will see a first-hand demonstration of how quantitative modeling can be used to communicate risk and understand ROI. Attendees will walk away with the tools needed to present cyber risk as a dollar amount that can be easily understood by other business decision-makers at their company.

Topics: Data Management, Information Security
11:00 - 11:50 AM

[1 CPE] Protecting Your Critical Data

  Presented by Optiv & Rubrik

Businesses today rely heavily on technology and data. Though most organizations have developed strategies to access critical data during an outage caused by natural disasters or power disruptions, these strategies are ineffective during a cyber attack. Interconnected users, servers, cloud devices, and continuous web access results in an environment that is open for cybercriminals to significantly disrupt operations and/or take an entire network hostage.

How can you support the identification and protection of critical data that must be shielded from the impact of cyber attacks, while also enabling rapid recovery to a secure state? Join us to learn how you can automatically store backups in a malware-protected, air-gapped vault or a remote cloud-based solution that safeguards your data’s confidentiality, integrity, and availability. We’ll discuss how you can ensure your data is verified and clean before entering the vault and is maintained in an immutable state while within the vault, significantly reducing recovery time by guaranteeing that you are recovering to a known good state.

Topics: Business Continuity / Disaster Recovery
2:00 - 2:50 PM

[1 CPE] 2022 Threat Review

  Presented by Malwarebytes

The Malwarebytes 2022 Threat Review is an annual report on the latest threats, attack trends, and privacy breaches impacting individuals, organizations, and national security. Researchers detail threat intelligence across operating systems and examine how privacy has shifted and the ways that cybercriminals and crimes are evolving. With a stronger understanding of the threat landscape, organizations and individuals can make more informed security and cyber-protection decisions.

Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Nancy Baker
Assistant Director, Information Technology
University of Kansas

Kip Ballinger
Sr Cyber Security Specialist
Leidos

Shaun Bender
Vice President, Mobile Operations
Sullivan Law Firm

Kevin Blazer
Information Security Officer
Academy Bank

Richard Borlaza
Director, Information Technology
Hyman Brand Hebrew Academy

Amy Botts
Manager, Information Security Risk
Hallmark Cards Inc

Sherry Callahan
Chief Information Security Officer
Dairy Farmers of America

Geoff Degen
Director, Information Technology
CrossFirst Bank

Shawn Geib
Director, Security
Honeywell FM&T

Adrian Guerrero
Director, Operations
Kansas State Board of Nursing

Dave Ireland
Manager, Information System Security
US Dept of Agriculture

Britney Kennedy
Business Information Security Officer
Cardinal Health

Jason Kentner
Director, Information Technology
KCAS Bioanalytical & Biomarker Services

Chris Mann
Chief Information Officer
DH Pace

Harry Maroudas
Information Systems Security Office
USDA Risk Management Agency

Michael Nixon
Director, Information Security
Stormont Vail Health

Nathan Powell
IT Administrator
Lewis Rice LLC

Stan Rumford
Vice President, Information Technology
Envista Credit Union

Jenya Sablin
Sr Manager, Information Technology
Black Knight Financial Services

Gary Schieber
Executive Director, Technology and Information Security
Baker University

BJ Smith
Head of Information Security
Seaboard Foods

Kara Speciale
Director, Information Security Governance Risk & Compliance
Children’s Mercy Hospital

Melissa Spicer
Sr Manager, Information Security
Evergy

Andrew Spidle
Director, Information Technology
Axcet HR Solutions

Vernon Turner
IT Administrator
Ultra Precision Control Systems

Altaf Uddin
Director, Information Systems
University of Kansas School of Pharmacy

David Upsdell
Sr Vice President
Midwest Trust Company

Rachel Vessar
Director, Technology
Maysville R-I School District

Adam Wasserman
Director, Information Technology
Paris Brothers

Mark Wilcox
Information Security Officer
NBKC Bank

David Witte
Sr Manager, Information Security
MO Jackson County

Florian Yanez
Director, Information Security
Helzberg Diamonds

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Hitachi Vantara

Hitachi Vantara

Hitachi Vantara
Hitachi Vantara helps enterprises create and derive value from their data. Its solutions include best-in-class data management, IT infrastructure and analytics products, IoT solutions and Smart Spaces technologies for a broad range of industries.
Visit Website

SILVER SPONSORS

42Crunch

42Crunch

42Crunch
42Crunch is an API Security platform, addressing the development, testing, and deployment security requirements of API infrastructure.
Visit Website
Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
Cribl

Cribl

Cribl
Founded with a vision of simplifying big data and log analytics at scale, Cribl is innovating the real-time data pipeline. Led by a team of experts in IT Operations and Observability, Cribl provides users a new level of visibility, intelligence, and control over their data.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet helps organizations across the public and private sectors protect the systems, data, and services that keep businesses and communities running. From government agencies and schools to enterprises and service providers, leaders rely on Fortinet to secure critical infrastructure, ensure operational continuity, and defend against evolving cyber threats. Our Security Fabric platform unifies networking and security to deliver the visibility, control, and efficiency organizations need to operate confidently, whether virtual, in the cloud, or on-premises.
Visit Website
Malwarebytes

Malwarebytes

Malwarebytes
Malwarebytes protects workplace productivity. We secure all your endpoints so employees can connect confidently, from anywhere. We combine analytics-driven, multi-layer threat protection and industry-leading incident response to both simplify and strengthen overall cybersecurity. You and your team stay up and running, so you can remain focused on driving your business.
Visit Website
Novacoast

Novacoast

Novacoast
Novacoast is an international cybersecurity company specializing in IT services and software development. With a 28-year history in the industry, Novacoast has built and maintains IT security solutions for some of the world’s largest private and public organizations. Our team is comprised of hundreds of specialists with backgrounds in IT advisory, development and engineering, and managed services. Together, we’re committed to identifying unique ways to improve the productivity and security posture of our customers.
Visit Website
Optiv

Optiv

Optiv
Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential.
Visit Website
Red Canary

Red Canary

Red Canary
The Red Canary Security Operations Platform, driven by purpose-built technology, security research, and threat intelligence, provides advanced threat detection and response across your entire IT estate to improve your security outcomes.
Visit Website

BRONZE SPONSORS

ExtraHop

ExtraHop

ExtraHop
ExtraHop delivers enterprise cyber analytics that allow you to quickly investigate threats, ensure the delivery of critical applications, and secure your investment in the cloud.
Visit Website
Fastly

Fastly

Fastly
Fastly helps the world’s most popular digital businesses keep pace with their customer expectations by delivering fast, secure, and scalable online experiences. Businesses trust the Fastly edge cloud platform to accelerate the pace of technical innovation, mitigate evolving threats, and scale on demand. The company's edge cloud platform enables the best of the web to thrive and helps to deliver better online experiences.
Visit Website
Gigamon

Gigamon

Gigamon
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.
Visit Website
InNet

InNet

InNet
InNet partners with customers to design, deploy, and support a full suite of advanced technology solutions focusing upon enterprise and mid-market IT organizations and assisting in regards to networks, information security, business continuity, storage, cloud migration, virtualization and performance monitoring.
Visit Website

EXHIBITORS & ASSOCIATIONS

ARMA Greater Kansas City

ARMA Greater Kansas City

ARMA Greater Kansas City
The Greater Kansas City Chapter of ARMA International is an association of professionals serving the Information Management field. Our membership includes members of the business community serving the Information Management profession.
Visit Website
ASIS Kansas City

ASIS Kansas City

ASIS Kansas City
ASIS International is the preeminent organization for security professionals. Founded in 1955, ASIS is dedicated to increasing the effectiveness and productivity of security professionals.
Visit Website
AWS Kansas City User Group

AWS Kansas City User Group

AWS Kansas City User Group
This group is for all current (and potential) users of Amazon Web Services. We'll talk about general cloud topics as they pertain to AWS such as security, scalability, architecture, etc.
Visit Website
DAMA Kansas City

DAMA Kansas City

DAMA Kansas City
KC DAMA is a vibrant community of data professionals and business users sharing our experiences and learning from each other. We welcome you to join us.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
InfraGard Kansas City

InfraGard Kansas City

InfraGard Kansas City
InfraGard is a non-profit organization set up nationally by the FBI to create a forum for public and private organizations to work together in an effort to secure our homeland's Infrastructure and Key Resources (CI/KR).
Visit Website
IP Pathways

IP Pathways

IP Pathways
IP Pathways delivers a consultant-led experience to overcome all IT challenges your organization faces today. Our best-in-class engineers first listen to your goals then architect, implement, monitor, support, and manage custom technology solutions to help you reach them. Whether in the cloud or on-premise, we strive to understand your business and become a true strategic technology partner.
Visit Website
ISACA Kansas City

ISACA Kansas City

ISACA Kansas City
The ISACA KC Chapter was founded in 1984 and continues to promote the education of individuals relating to the auditing of, management consulting in, or direct management of the fields of IT governance, IS audit, security, control and assurance.
Visit Website
ISC2 Kansas City

ISC2 Kansas City

ISC2 Kansas City
ISC²®, is the global, not-for-profit leader ineducating and certifying information security professionals throughout theircareers. We are recognized for Gold Standard certifications and world class education programs.
Visit Website
ISSA Kansas City

ISSA Kansas City

ISSA Kansas City
Through its membership, ISSA -Kansas City helps security professionals in the Kansas City area learn of information security issues and trends, which promote education, collaboration, and leadership, and further the information security profession.
Visit Website
KC Tech Council

KC Tech Council

KC Tech Council
The KC Tech Council represents Kansas City’s tech industry, a diverse ecosystem anchored by multinational corporations and driven by innovative entrepreneurs, with industry footholds in healthcare IT, telecommunications, digital media and more.
Visit Website
Mental Health Hackers

Mental Health Hackers

Mental Health Hackers
Our mission is to educate tech professionals about the unique mental health risks faced by those in our field – and often by the people who we share our lives with – and provide guidance on reducing their effects and better manage the triggering causes.
Visit Website
PMI Kansas City

PMI Kansas City

PMI Kansas City
Our chapter is comprised of project management professionals and others interested in project management in and around Kansas City.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website
SecKC

SecKC

SecKC
SecKC is dedicated to supporting the local Kansas City InfoSec community by providing a regular meeting space to share knowledge, collaborate on projects, share tools, and grow as a group.
Visit Website
UV&S

UV&S

UV&S
UV&S offers multiple solutions to meet the needs of your business from hardware & software purchases to Managed Services. We offer secure offsite backups & private cloud services in our fully redundant data center, minimizing the possibility of downtime.
Visit Website
Women in Security Kansas City

Women in Security Kansas City

Women in Security Kansas City
Our vision for Women in Security, Kansas City, is to inspire and support women at all career levels in Information Security. We provide focus for women in Information Security with peer mentoring, workshops, and networking opportunities.
Visit Website

Interested in becoming part of our next Kansas City event?

CONTACT US FOR INFO

Kansas City

Overland Park Convention Center
Ballrooms AB
6000 College Boulevard
Overland Park, KS 66211

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.