F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Virtual Montana 2020 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

October 22nd, 2020
8:30am – 4:30pm

Virtual Conference
Multi-track seminars with Q&A
1-on-1 chat and networking
Hourly prize drawings

KEYNOTE: The State of Cybersecurity

  Presented by Andy Hanks • Chief Information Security Officer, State of Montana

Seminar Schedule

  • Theater One
  • Theater Two
  • Sessions
  • Keynote
9:00 - 9:50 AM

Why Every Business Needs a Business Continuity & Disaster Recovery Strategy

  Presented by Veeam

Today’s applications and data sets are larger, more complex, distributed and interdependent than ever. While many have a disaster recovery plan in place, executing, testing and documenting these plans is often complex and cumbersome.

We'll also discuss:

  • State of BCDR today and what hinders DR planning for most companies
  • Why backup strategy is not DR strategy
  • Democratized DR of today (how tedious, manual procedures can be completely automated, and at accessible cost)
Topics: Business Continuity / Disaster Recovery
10:00 - 10:50 AM

IT Interrupted: Best Practices in Disaster Recovery Planning

  Presented by Zerto

As IT application availability requirements continue to evolve, technology continues change to meet the new requirements. Join us as we discuss planning considerations for bringing your virtualized workloads into the next generation of IT resilience. You will learn about data center options to consider as part of your recovery strategy, business and technical trade-offs that will have to be made, capacity planning considerations, and testing approaches to that are possible that will optimize application up-time.

Topics: Business Continuity / Disaster Recovery
11:00 - 11:50 AM

SD-WAN Edge Transformation for the Cloud-First Enterprise

  Presented by Silver Peak

As cloud adoption and SD-WAN innovation hastens, global enterprises are transforming how they build and secure wide area networks. Leveraging automation, enterprises can deploy, connect and secure hundreds of sites per week, a feat not possible with a traditional device-centric approach.

During this session, we'll discuss how the unification of SD-WAN, WAN optimization, routing and security in a single, centrally orchestrated platform:

  • Delivers superior application performance wherever apps are hosted
  • Increases the quality of experience for end users and for IT
  • Simplifies branch WAN edge architecture
Topics: Data Storage, Infrastructure
12:00 - 12:50 PM

Master the Edge: How to Achieve Context-Aware, Zero Trust Network Access

  Presented by Aruba & Structured

Have you been tasked with implementing Zero Trust Network Access but are unsure of how to go about it? Are you confused about how to achieve “minimum access”? Are you struggling with employing “continuous adaptive risk & trust assessment” on your network? If so, attend this session. Learn how to deploy an open, multi-vendor Enterprise security framework that gives security and IT teams an integrated way to gain visibility, control, and advanced threat defense. See how security prioritization and machine learning helps organizations leverage existing third-party solutions to better protect investments and implement proactive risk controls.

Topics: Information Security
1:00 - 1:50 PM

Infoblox Threat Intelligence Report: July – September 2020

  Presented by Infoblox

This session will dive into recent Threat Intelligence Research including new malware variants and trends that were prominent over the July-September 2020 timeframe. We will examine specific Ransomware, Infostealers, Trojans, and RATS! attacks that surfaced over the last 90 days. Discover tips to improve your defenses and defeat these types of treats.

Topics: Information Security
2:00 - 2:50 PM

One Company’s Journey to a Modern Data Center Environment

  Presented by Structured

When the facilities team at a healthcare organization in the Pacific Northwest announced to the IT team that they were undertaking a campus remodel project and they needed the on-prem data center for office space, the IT team quickly sprang into action to find a new home for their DR environment. From learning of this management decision, to performing a due diligence assessment of their ability to use a DRaaS solution, into an RFI and RFP process, and coming to agreement on a contract, this was one of the most rigorous evaluation projects the company has undertaken. This presentation will describe that journey of evaluation and discovery, including the rest of the story which describes the onboarding process and challenges faced along the way. Craig Rhodes is an experienced professional actively engaged with various clients providing Data Center and Program Management consulting services.

Topics: Data Center Technology
Andy HanksAndy HanksChief Information Security Officer, State of Montana
3:00 - 3:50 PM

The State of Cybersecurity

  Presented by Andy Hanks • Chief Information Security Officer, State of Montana

Join the State of Montana’s Chief Information Security Officer, Andy Hanks, on an imaginative journey that utilizes real cybersecurity concepts, frameworks, and resources that State, Local, Tribal, and Territorial (SLTT) governments can use to enhance their cybersecurity posture. Andy discusses the current state of cybersecurity by conceptualizing a State of Cybersecurity that must protect it’s data in a rapidly evolving threat environment where hackers leverage sophisticated tools to launch persistent attacks.

Andy Hanks is a business-driven cybersecurity executive with over 25 years of experience in information technology, a Master of Science in Information Systems, and multiple cybersecurity certifications. As Chief Information Security Officer for the State of Montana, Andy’s mission is to protect citizen's data. Andy partners with state and federal agencies to identify threats, mitigate vulnerabilities, and reduce risks; and he collaborates with cybersecurity leaders across the nation to develop and implement best practices.

Andy represents Montana’s cybersecurity interests in the State Legislature, State Information Technology Manager’s Council, and the State Information Technology Board. He is chair of the Montana Information Security Advisory Council, a member of the Multi-State Information Sharing and Analysis Center Executive Committee, and a member of the State, Local, Tribal, and Territorial Government Coordinating Council. Andy enjoys backpacking, watching football, and riding his motorcycle.

Topics: Information Security
  • Sessions
9:00 - 9:50 AM

Cyber AI and Geopolitics: Managing Tomorrow’s Cyber Risk

  Presented by Darktrace

Against a backdrop of escalating geopolitical tensions and an ever-evolving threat landscape, the risk of cyber-attacks to governments and the private sector alike has never been higher. Join Darktrace’s Director of Strategic Threat, Marcus Fowler, and Americas CISO, JR Tietsort to discuss this new era of cyber-threat and how Cyber AI can help defenders regain the upper hand.

This speaking session will include a Q&A with our experts, and explore:

  • How nation-state attacks are changing
  • How organizations can respond to the classic balance of security and productivity
  • How organizational maturity in risk management is maintained whilst ensuring cyber defense

Topics: Information Security
10:00 - 10:50 AM

Office 365 Security Best Practices: At the Office, at Home, and on the Road

  Presented by Mimecast

Cyber-hygiene has become a source of great concern of late. And while the Office 365 suite has helped communication and collaboration from multiple location points (at the office, at home, and on the road) there are still security concerns that must be mitigated. In this presentation, we will hear best practice suggestions for remaining safe while using Office 365. First, we’ll talk about security attitudes, then review CISA concerns with Office 365, and finally offer best practice suggestions and thought leadership. This presentation will be driven by J. Peter Bruzzese… cyber-security advisor and 8x awarded Microsoft MVP (Exchange/Office 365).

Topics: Information Security, Infrastructure
11:00 - 11:50 AM

Cyber-Threats in Montana and Worldwide

  Presented by Pine Cove Consulting

In this presentation we will share our findings on the current outlook of cyber-attacks in Montana including the number of organizations that have suffered a data breach that has affected Montanans, the number of Montanans that have been affected by data breaches, and the average length of data breaches. We will also analyze the three-year trend for each of these statistics. Sophos Security will join us and give us a nation and worldwide state of affairs for cyber-threats and ransomware.

You can't protect your organization if you aren't educated on the threats. Join our presentation to get a better view of the current threat landscape to organizations in Montana, the United States, and worldwide. We will also share tips and best practices for securing your organization against these threats.

Topics: Information Security
12:00 - 12:50 PM

You’ve Got Mail

  Presented by LGIT

Cyber threats in email are still a useful tool from malicious groups. In this session, we will discuss how to forensically analyze emails from head to foot and everything in between. You will learn how to spot suspicious email and confidently determine if it is malicious. Join the LGIT group for a practical discussion on dealing with threats.

Speakers:
Zach Tielking • Information Security Analyst, State of Montana
Trever Hass • Information Security Analyst, State of Montana

Topics: Information Security
1:00 - 1:50 PM

Your Complete Business Communications Solution in the Cloud

  Presented by Mitel & Structured

Are you ready to move communication and collaboration to the cloud with confidence? If so, attend this session to learn how. MiCloud Connect is a full-featured communications and collaboration solution that is easy to deploy and manage. Blend traditional phone system features such as call transferring, extension dialing and more with instant messaging, conferencing, video and screen sharing. This allows you and your team to save time, reduce travel and efficiently collaborate with others. Plus, with the ability to make changes in real time, you can change your call routing or presence on the fly.

Topics: Data Storage
2:00 - 2:50 PM

It Ain’t Done ‘Til It’s Automated: Security at the Speed of DevOps

  Presented by Check Point

Companies are rapidly migrating applications and workloads to the cloud. For many this is a Software as a Service for a first option, with migration to public cloud second, and only if necessary will workloads be deployed inside of the legacy data center. This is further complicated by the desire to accelerate the development lifecycle allowing devops to drive the IT migration. InfoSec is playing catchup to the business and devops constant acceleration.

In this session, you will learn strategies and best practices for allowing SecOps to keep up with the Speed of DevOps, as well as fundamental security knowledge applicable for any workload migration to any cloud provider.

Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Mike Bousliman
Chief Information Officer
Montana DOT

Tim Capps
Manager, Systems Administration
Montana State University

Jason Emery
Chief Information Officer
Missoula County

Brett Etzel
Director, Information Technology
Morrison-Maierle

Adrian Irish
Information Security Officer
University Of Montana

John Janusz
Manager, IT Operations
Easter Seals-Goodwill N Rocky Mountain

Margaret Kauska
Chief Security Officer
Mt Department of Revenue

Shane Kolwyck
Director, Information Technology
Torgerson’s LLC

Brad Kowalski
Chief Information Officer
Marcus Daly Memorial Hospital

Peter Martinson
Supervisor, Information Technology
Montana State University

Andy Metroka
VP, Information Systems
Kampgrounds of America, Inc.

Paul Morton
Manager, Data Center & Disaster Recovery
Washington Corporations

Michele O’Brien
Assistant VP, Information Technology
Easter Seals

Jerry Rapp
Chief Information Officer
Town Pump

Kaveh Ruhi
Manager, Network Infrastructure & Telephony
Glacier Bancorp Inc

Ryan Schoppe
Director, Information Technology
Bighorn Valley Health Center

Mark Simon
SVP, Chief Information Officer
Benefis

Brett Weisz
Chief Information Officer
Montana State University, Billings

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
Infoblox

Infoblox

Infoblox
Infoblox unites networking and security to deliver unmatched performance and protection. Trusted by Fortune 100 companies and emerging innovators, we provide real-time visibility and control over who and what connects to your network, so your organization runs faster and stops threats earlier.
Visit Website
Mimecast

Mimecast

Mimecast
Mimecast is a cybersecurity provider that helps thousands of organizations worldwide make email safer, restore trust and bolster cyber resilience.
Visit Website
Pine Cove Consulting

Pine Cove Consulting

Pine Cove Consulting
Pine Cove Consulting has serviced educational institutions, government agencies, and businesses across the Rocky Mountain Region since 1993. Pine Cove is a Sophos Platinum Partner and offers a suite of cybersecurity products to protect your organization.
Visit Website
Silver Peak

Silver Peak

Silver Peak
Silver Peak, recently acquired by HPE Aruba, delivers networking software that powers a self-driving wide area network (SD_WAN) that learns and adapts to requirements of the business to ensure the highest levels of end user and application performance.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website

BRONZE SPONSORS

Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
IVOXY Consulting

IVOXY Consulting

IVOXY Consulting
Since 2006 IVOXY has been delivering right-sized IT solutions & services throughout the Greater Pacific Northwest. We partner with customers throughout all phases of deploying innovative data availability technologies spanning virtualization, networking, storage, automation, security, data protection, cloud, and beyond.
Visit Website
NetApp

NetApp

NetApp
NetApp – Our team is data driven. You have a vision for digital transformation. We help you make it all possible.
Visit Website

EXHIBITORS & ASSOCIATIONS

HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
Mitel

Mitel

Mitel
We are the business communication experts powering more than 2 billion connections every day, including over 33 million daily cloud connections. We help companies connect, collaborate and take care of their customers anywhere, anytime, over any device.
Visit Website
Sophos

Sophos

Sophos
Sophos Security's synchronized security approach enables organizations to secure their organization with a suite of products and services designed to tackle the zero-day threats of today and the future.
Visit Website

Interested in becoming part of our next Montana event?

CONTACT US FOR INFO

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.