F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Kansas City 2025

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Kansas City EVENTS

AT A GLANCE

August 14th, 2025
8:30am – 4:30pm

Overland Park Convention Center
Ballrooms A2, B, C
6000 College Boulevard
Overland Park, KS 66211

Directions & Parking

Venue Accessibility

KEYNOTE: [1 CPE] Safeguarding Kansas: A Strategic Update on Cybersecurity and Resilience

  Presented by John Godfrey • Chief Information Security Officer, State of Kansas

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Building a Fortress: Why Allowlisting Traffic is Key to Secure Networks

  Presented by Charles Killmer, Sr Security Analyst and Solution Architect • FRSecure

In this presentation, we’ll explore the critical role of allowlisting in enhancing network security. By focusing on controlling both ingress and egress traffic, allowlisting ensures that only trusted traffic is permitted, reducing the attack surface and minimizing vulnerabilities. Learn how adopting a comprehensive allowlisting strategy can help build a secure, resilient network fortress, protecting your systems from malicious threats and unauthorized access. Whether you're implementing it for the first time or refining your approach, this session will highlight best practices and common pitfalls.

Topics: Information Security, Infrastructure
10:00 - 10:50 AM

[1 CPE] Beyond Cybersecurity: Assembling Resiliency for the Inevitable Breach

  Presented by BJ Deonarain, Global Alliance Cybersecurity Solutions Director • Hitachi Vantara

The Imperative for Resiliency, 100% cyber security is unachievable; breaches are inevitable, where modern threats demand a shift from reactive defense to proactive resilience. Resilience requires mindset and culture change, not just new technology, while focus can sustain operations and limit damage when security fails.

Assembling the resiliency strategic pillars and actions:

  • Risk Assessment: continuous evaluation of assets and vulnerabilities
  • Incident Response: develop, test, and update comprehensive crisis plans
  • Employee Training: ongoing education to make staff the first line of defense
  • Systems Testing: regular audits, penetration tests, and vulnerability scans
  • Partnerships: collaborate with industry experts for knowledge sharing
  • Culture: embed resiliency throughout the organization at every level

BJ Deonarain is a globally focused cybersecurity executive responsible for driving cyber security and cyber resiliency strategy at Hitachi Vantara. With a career spanning technical innovation, client solutions, and cross-functional leadership, BJ combines deep technical expertise with a client-centric approach to mitigate risk and elevate organizational security postures.

Topics: Information Security, Strategic Management
11:00 - 11:50 AM

[1 CPE] What the Hack is Going On?

  Presented by Tim Medin, Chief Executive Officer • Red Siege

A comprehensive overview of modern cybersecurity threats and how breaches occur. We will highlight the various methods used by cybercriminals, including phishing, social engineering, and ransomware attacks, and emphasize the importance of identifying and addressing vulnerabilities before they can be exploited. There are a lot of vulnerabilities in the wild, and IT administrators and security professionals often focus on the wrong issues because they are easier to monitor or measure. By the end of the presentation, you will have gained valuable insights into the latest cybersecurity threats and how to protect against them.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Zero Trust Segmentation: It’s Easier Than You Think

  Presented by Sumi Gorla, Director of Systems Engineering • Illumio

Regardless of how sophisticated a ransomware attack may be, the objective remains the same: exploit a vulnerability and move laterally across your network. In this session, we’ll peel back the layers and walk through simple steps to get started with Zero Trust Segmentation, including:

  • Gaining deep, real-time visibility into where your environment is most exposed
  • Identifying and closing risky ports to reduce your attack surface
  • Making the most of tools already in place—without adding operational complexity

Sumi Gorla is Director of Systems Engineering at Illumio, driving product strategy, field enablement, and customer success across US Central and LATAM. With leadership experience at EMC, Brocade, Citrix, and BigSwitch, she leads high-performing teams to solve business problems and deliver impactful solutions. Sumi bridges technical depth with clear, outcome-driven communication.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Has Security Awareness Been Forgotten? An Interactive Panel Discussion

  Presented by INTERFACE Advisory Council

“Just automate that process! The firewall is fine—we’ve got an AI tool watching it.”

Sound familiar? Despite significant investments in cybersecurity and advanced tools, the human element remains one of the greatest vulnerabilities in any organization. This isn't a new problem—ransomware attacks continue to thrive due to human error.

Insider threats, whether intentional or accidental, are often at the root of security breaches. So, what proactive steps are you taking to mitigate these risks?

Join the INTERFACE Kansas City Advisory Council for an engaging discussion on defending against internal threats. Local IT leaders will share their strategies, lessons learned, and practical tips for minimizing human error in cybersecurity. Bring your questions and join the conversation as we explore what’s working, what’s not, and what more needs to be done to protect our networks from within.

Moderator: Holly Giammanco, Director of Information Security, Greater Kansas City Community Foundation

Panelists:

  • Amy Botts, Manager, Information Security Risk, Hallmark Cards, Inc.
  • Bill Kim, Chief Information Security Officer, Security Bank of Kansas City
  • Chris Smalley, Director, Information Technology, Hoefer Welker
  • Melissa Spicer, Director, Cybersecurity, Evergy
Topics: Information Security, Strategic Management
John GodfreyJohn GodfreyChief Information Security Officer, State of Kansas
3:00 - 3:50 PM

[1 CPE] Safeguarding Kansas: A Strategic Update on Cybersecurity and Resilience

  Presented by John Godfrey • Chief Information Security Officer, State of Kansas

Join Kansas State CISO, John Godfrey, for an in-depth look at Kansas’ cybersecurity landscape, key threats, and ongoing initiatives to strengthen cyber resilience. This session will highlight recent advancements in security frameworks, interagency collaboration, and strategies to combat emerging risks, such as deepfakes and social engineering. Attendees will gain insights into policy updates, incident response improvements, and future priorities aimed at safeguarding Kansas’ digital infrastructure.

A seasoned cybersecurity executive and entrepreneurial dynamo with 18 years of rich experience, John Godfrey excels in delivering cutting-edge technology and information security strategies. Godfrey has a knack for transforming organizations through modern digital solutions, spurring business enablement, and fostering talent elevation. His unique blend of action-oriented leadership and influential communication has consistently steered executives and boards through periods of organizational metamorphosis.

Demystifying complex technology and making it comprehensible is one of his key strengths. Known for my fervor and transformative leadership, he has spoken at numerous local and national conferences, moderated sessions, featured as a podcast guest, and contributed articles to various magazines and publications.

Presently, he holds pivotal roles as a board member and advisor to boards of directors. Godfrey is actively engaged with the information security community, holding memberships in premier organizations like ISC2, ISSA, ISACA, InfraGard, and more. His academic arsenal includes several industry certifications and is currently pursuing a Doctorate in Cybersecurity with a focus on executive leadership.

Topics: Information Security, Infrastructure
  • Sessions
9:00 - 9:50 AM

[1 CPE] Legacy to Modern: Data Migration & Integration for Business Continuity

  Presented by Rami Ramireddy, Chief Executive Officer • ESS

As organizations evolve, aging systems can become a barrier to agility, security, and scalability. This session explores how to transition from legacy platforms to modern ERP environments while maintaining business continuity and disaster recovery readiness. We’ll discuss best practices for data migration, internal system integration, and secure API exposure to external partners—all without referencing specific products or services.

Attendees will gain insights into:

  • Planning and executing data migration with minimal disruption
  • Designing resilient architectures for business continuity
  • Strategies for disaster recovery in hybrid environments
  • Connecting internal systems and exposing data securely via APIs
Topics: Business Continuity / Disaster Recovery, Data Management, Infrastructure
10:00 - 10:50 AM

[1 CPE] Go Hack Yourself: More War Stories from over 150,000 Pentests

  Presented by Ramzi Harb, Sr Solutions Architect • Horizon3.ai

Join Ramzi Harb, Senior Solutions Architect, for an engaging session on “Offense-Driven Defense.” Ramzi will challenge conventional risk assessment practices and unveil how focusing on real-world exploitability and impact can revolutionize your security approach. Drawing from insights gathered across more than 150,000 autonomous pentests, he’ll share compelling stories and actionable lessons that show how viewing your cyber terrain through an attacker’s lens can uncover hidden vulnerabilities, optimize resource allocation, and strengthen your defenses against advanced threats. Don’t miss this opportunity to learn from a leading industry practitioner on why it’s time to “go hack yourself” and build resilience in today’s borderless threat environment.

Topics: Information Security, Strategic Management
11:00 - 11:50 AM

[1 CPE] Cybersecurity Defense Strategies

  Presented by Scott Beasley, Cybersecurity Solutions Architect • Comcast Business

What are the common threats organizations face and how do these threats get into the network? Join this session to learn what you can do to slow down attackers and mitigate threats when you are attacked. We’ll review the types of services organizations need to help defend against attacks and where to find them.

Topics: Information Security
12:00 - 12:50 PM

[1 CPE] Cyber Risk Associated with Quantum Computing

  Presented by BJ Deonarain, Global Alliance Cybersecurity Solutions Director • Hitachi Vantara

Quantum computers can break today's standard encryption algorithms (RSA, ECC) in minutes relative to time using Shor’s/Grover algorithm. “Harvest Now, Decrypt Later” attacks allow adversaries to steal encrypted data now and crack it when quantum computers mature. Quantum systems themselves are vulnerable to new attack vectors, quantum hacking (side-channel, noise-based), quantum malware, and manipulation of qubit stability. Supply chain attacks targeting quantum hardware, proprietary algorithms, and insider threats are rising as nation-states and cybercriminals escalate espionage efforts. Urgent need for quantum-resistant cryptography and robust quantum cybersecurity measures as quantum adoption accelerates.

BJ Deonarain is a globally focused cybersecurity executive responsible for driving cyber security and cyber resiliency strategy at Hitachi Vantara. With a career spanning technical innovation, client solutions, and cross-functional leadership, BJ combines deep technical expertise with a client-centric approach to mitigate risk and elevate organizational security postures.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Architecture Matters: What You Need to Know When Evaluating SASE & SSE Solutions

  Presented by Rehman Khan, Director, Cyber Architecture & Engineering • Netskope

SASE and SSE are more than just buzzwords; they represent the future of network and security. But before you entrust all your critical traffic to these cloud solutions, a deeper dive into their underlying architecture is essential. Not all clouds are created equal, and understanding the nuances of these solutions, which are built on the global internet, is paramount for success.

This session will empower attendees with the crucial architectural questions to ask your SASE/SSE providers, ensuring you make an informed decision. We'll explore:

  • Public vs. Private Cloud: What are the implications for your data and performance?
  • Server Locations: Where are security services hosted, and why does proximity matter?
  • Network Architecture: How is the provider's network built and managed for optimal reliability and speed?
  • Capacity Management: How do they scale to meet your evolving demands and ensure consistent performance?
  • Performance Measurement: What metrics should you track, and how do providers guarantee their SLAs?
  • Incident Response: What happens when something breaks, and how quickly can services be restored?

Arm yourself with the right questions to build a secure and high-performing SASE/SSE future.

Topics: Infrastructure

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Eric Baer
Chief, IT Service and Design Section
US Dept of Agriculture

Shohab Baig
Chief Technology Officer
Children’s Mercy Hospital

Jason Baity
Manager, Information Technology
KanEquip

Nancy Baker
Assistant Director, Network Operations
University of Kansas

Kip Ballinger
Sr Cybersecurity Specialist
Tista Science & Technology

Kevin Blazer
Sr Vice President, Information Security Officer
Academy Bank

Amy Botts
Manager, Information Security Risk
Hallmark Cards, Inc.

Sherry Callahan
Chief Information Security Officer
Dairy Farmers of America

W. S. Cheng
Manager, Information Security & Risk
Spencer Fane LLP

David Daniel
Manager, Information Security
Shook, Hardy & Bacon

Geoff Degen
Managing Director, Information Security
CrossFirst Bank

Holly Giammanco
Director, Information Security
Greater Kansas City Community Foundation

Shawn Geib
Chief Information Security Officer
Honeywell FM&T

Adrian Guerrero
Director, Operations
KS State Board of Nursing

Dave Ireland
Deputy Director, EHSD
US Dept of Agriculture

Justin Johnson
Director, Service Delivery
Kansas City Chiefs

Britney Kennedy
Global Business Information Security Officer
Cardinal Health

Jason Kentner
Chief Information Security Officer
KCAS Bioanalytical & Biomarker Services

Bill Kim
Chief Information Security Officer
Security Bank of Kansas City

Saadia Mahmood
CISO, Director, Enterprise Risk
NBH Bank

Chris Mann
Vice President, Information Technology
IBT Industries

Harry Maroudas
Information Systems Security Officer
USDA Risk Management Agency

Tim Miller
Sr Vice President, Manager, IT
First National Bank of Hutchinson

Brian Olberding
Manager, IT Operations
Root Insurance

Nathan Powell
IT Administrator
Lewis Rice LLC

Stan Rumford
Vice President, Information Technology
Envista Credit Union

Jenya Sablin
Vice President, Infrastructure Solutions
ICE Financial Services

Tom Scuderi
Sr Manager, Information Security GRC
LTK

Maria Singh
Cybersecurity Content Manager
Enterprise KC

Janice Small
Manager, Governance, Risk and Compliance
Honeywell FM&T

Chris Smalley
Director, Information Technology
Hoefer Welker

BJ Smith
Head of Information Security
Seaboard Foods

Kara Speciale
Chief Information Security Officer
Children’s Mercy Hospital

Melissa Spicer
Director, Cybersecurity
Evergy

Ted Tartenaar
Manager, Information Technology Systems
Johnson County Park & Recreation District

David Upsdell
Sr Vice President, Information Security
Midwest Trust Company

Rachel Vessar
Director, Technology
Maysville R-I School District

Joe Whitten
Director, Information Technology
Challenger Teamwear

Brett Wiard
Director, Security
Unite Us

Mark Wilcox
Chief Information Security Officer
Capital Bank

Eddie Williams
Sr Director, Information Security
Versant Health

Nichole Windholz
Chief Information Security Officer
Onspring

Kyle Zdrojewski
Director, Infrastructure & Support
CrossFirst Bank

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Hitachi Vantara

Hitachi Vantara

Hitachi Vantara
Hitachi Vantara helps enterprises create and derive value from their data. Its solutions include best-in-class data management, IT infrastructure and analytics products, IoT solutions and Smart Spaces technologies for a broad range of industries.
Visit Website

SILVER SPONSORS

Comcast Business

Comcast Business

Comcast Business
Comcast Business has the largest IP network in the nation, serving small businesses through large enterprises. Technology offerings include Internet and Ethernet connectivity, voice solutions, and SD-WAN on ActiveCore(SM). Learn more at business.comcast.com/enterprise.
Visit Website
ESS

ESS

ESS
Enterprise Software Solutions Inc. (ESS) excels in providing ERP implementation and migration services for the manufacturing, construction, and service sectors.
Visit Website
FRSecure

FRSecure

FRSecure
FRSecure applies industry standards to assess existing information security programs (administrative, physical and technical security controls), and we develop, implement and manage information security programs tailored to each client’s specific security needs.
Visit Website
Horizon3.ai

Horizon3.ai

Horizon3.ai
Horizon3.ai enables organizations to continuously assess the security posture of their enterprise across many attack surfaces.
Visit Website
Illumio

Illumio

Illumio
Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes how workloads and devices are communicating, creates granular segmentation policies which only allow necessary communication, and automatically isolates ransomware and breaches. Assume breach. Minimize impact. Increase resilience.
Visit Website
Netskope

Netskope

Netskope
Netskope, a global SASE leader, helps organizations apply zero trust principles and AI/ML innovations to protect data and defend against cyber threats. The Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Learn how Netskope helps customers be ready for anything on their SASE journey, visit netskope.com.
Visit Website
Red Siege

Red Siege

Red Siege
Red Siege is one of the most trusted information security consulting firms in the industry that concentrates on the latest threats to organizations today. Red Siege performs in-depth analysis, determine organization/business risk, and finds the vulnerabilities before the bad guys do. The Red Siege team of trained, qualified, and experienced information security experts is led by one of the most recognized names in the industry, our CEO Tim Medin.
Visit Website

BRONZE SPONSORS

Adlumin

Adlumin

Adlumin
Adlumin's security and compliance automation platform helps organizations manage evolving threats and cybersecurity compliance requirements.
Visit Website
DataLocker

DataLocker

DataLocker
Keep your data safe. Elevate the security of your IT/OT environments with our comprehensive suite of encrypted storage solutions, endpoint protection, and management tools.
Visit Website
eSentire

eSentire

eSentire
eSentire’s complete, multi-signal Managed Detection and Response services provide 24/7 cutting-edge protection to prevent cybercriminals from ever disrupting your business.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
ManageEngine

ManageEngine

ManageEngine
ManageEngine powers businesses like yours to take control of your IT with enterprise-grade solutions built from the ground up.
Visit Website

EXHIBITORS & ASSOCIATIONS

7x24 Exchange Midwest

7x24 Exchange Midwest

7x24 Exchange Midwest
To provide a forum for our members to expand their professional networks, learn and teach others about new and useful technologies and operations, and to expand the ability to navigate the complex and sometimes intimidating field of Mission Critical Facility Management, Design, Construction, and Operation.
Visit Website
AFCOM Kansas City

AFCOM Kansas City

AFCOM Kansas City
AFCOM advances data center professionals by delivering comprehensive and vendor-neutral education and peer-to-peer networking to its members around the globe.
Visit Website
Airlock Digital

Airlock Digital

Airlock Digital
Airlock Digital delivers forward-thinking endpoint protection solutions which enable organizations to implement rapid, scalable allowlisting and execution control.
Visit Website
Allegiant

Allegiant

Allegiant
From cabling to the cloud, Allegiant offers a suite of comprehensive IT and business communication services including cybersecurity solutions, managed services and custom application integrations to drive business forward.
Visit Website
ASIS Kansas City

ASIS Kansas City

ASIS Kansas City
ASIS International is the preeminent organization for security professionals. Founded in 1955, ASIS is dedicated to increasing the effectiveness and productivity of security professionals.
Visit Website
DAMA Kansas City

DAMA Kansas City

DAMA Kansas City
KC DAMA is a vibrant community of data professionals and business users sharing our experiences and learning from each other. We welcome you to join us.
Visit Website
HDI Heartland

HDI Heartland

HDI Heartland
The Kansas City Heartland HDI chapter is a dynamic group of IT Service and Support Professionals who meet regularly to share ideas, best practices, provide educational opportunities and build business relationships. From first level resolvers to seasoned corporate leaders, our members represent market-leading companies across multiple verticals including retail, healthcare, education, technology, and finance in the Kansas City Area.
Visit Website
InfraGard Kansas City

InfraGard Kansas City

InfraGard Kansas City
InfraGard is a non-profit organization set up nationally by the FBI to create a forum for public and private organizations to work together in an effort to secure our homeland's Infrastructure and Key Resources (CI/KR).
Visit Website
ISACA Kansas City

ISACA Kansas City

ISACA Kansas City
The ISACA KC Chapter was founded in 1984 and continues to promote the education of individuals relating to the auditing of, management consulting in, or direct management of the fields of IT governance, IS audit, security, control and assurance.
Visit Website
ISC2 Kansas City

ISC2 Kansas City

ISC2 Kansas City
ISC²®, is the global, not-for-profit leader ineducating and certifying information security professionals throughout theircareers. We are recognized for Gold Standard certifications and world class education programs.
Visit Website
ISSA Kansas City

ISSA Kansas City

ISSA Kansas City
Through its membership, ISSA -Kansas City helps security professionals in the Kansas City area learn of information security issues and trends, which promote education, collaboration, and leadership, and further the information security profession.
Visit Website
KC Tech Council

KC Tech Council

KC Tech Council
The KC Tech Council represents Kansas City’s tech industry, a diverse ecosystem anchored by multinational corporations and driven by innovative entrepreneurs, with industry footholds in healthcare IT, telecommunications, digital media and more.
Visit Website
MSPAA

MSPAA

MSPAA
The MSP Association of America (MSPAA) has been established with three primary missions, each of which follows a unique trajectory aimed at providing our clients, members, and students with a collaborative and informative pathway towards building a future for technology, business, and education.
Visit Website
UnleashU

UnleashU

UnleashU
UnleashU demystifies complex systems and technologies, empowering teams with knowledge, skills, and independence to thrive in a rapidly evolving landscape.
Visit Website
WiCyS Kansas City

WiCyS Kansas City

WiCyS Kansas City
Women in CyberSecurity is the premier organization with international reach dedicated to bringing together women in cybersecurity from academia, research and industry to share knowledge, experience, networking and mentoring.
Visit Website
Women in Security Kansas City

Women in Security Kansas City

Women in Security Kansas City
Our vision for Women in Security, Kansas City, is to inspire and support women at all career levels in Information Security. We provide focus for women in Information Security with peer mentoring, workshops, and networking opportunities.
Visit Website

Interested in becoming part of our next Kansas City event?

CONTACT US FOR INFO

Kansas City

Overland Park Convention Center
Ballrooms A2, B, C
6000 College Boulevard
Overland Park, KS 66211

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.