F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Montana 2023 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Montana EVENTS

AT A GLANCE

July 25th, 2023
8:30am – 4:30pm

Montana State University
Strand Union Building
751 W. Grant Street
Bozeman, MT 59715

Directions & Parking

Venue Accessibility

KEYNOTE: [1 CPE] The Trek Toward Zero Trust

  Presented by Travis Light • Cybersecurity Advisor, CISA

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Transforming Networks: Harnessing AI and ML for Optimal Performance

  Presented by Pine Cove Consulting & Ruckus

In today's digitally interconnected world, networks play a critical role in ensuring seamless communication and data transfer. However, network performance and reliability can often be challenging to maintain. Each year, we see an increased number of devices added to our networks along with more use of high-bandwidth applications. IT teams often lack the tools to ensure required network service levels in an environment of ever-increasing user connectivity demands and network complexity. This presentation aims to explore the potential of artificial intelligence (AI) and machine learning (ML) techniques in overcoming these challenges.

The presentation will delve into various strategies and technologies that can help organizations improve their network performance. We will discuss proactive approaches to troubleshoot network issues before they escalate, saving valuable time and resources. By leveraging AI-powered tools and techniques, attendees will learn how to gain quick yet in-depth insights into their network's health, enabling them to identify and resolve potential bottlenecks efficiently.

This presentation will also emphasize the importance of customized data reports in network management. Attendees will discover how AI and ML tools can process vast amounts of network data, providing valuable information tailored to their specific needs. This capability allows network administrators to make informed decisions and optimize network performance based on relevant metrics and key performance indicators.

Additionally, cloud radio resource management (CRRM) will be explored to address co-channel interference—a common problem in wireless networks. We will shed light on how CRRM leverages AI and ML to intelligently allocate and manage radio resources via algorithms, mitigating interference and enhancing overall network performance. Attendees will gain insights into the benefits of this approach and its potential to revolutionize wireless network operations.

Overall, this presentation aims to empower network administrators and professionals with the knowledge and tools to transform their networks using AI and ML. By embracing these cutting-edge technologies, organizations can enhance network performance, ensure better reliability, and streamline their operations in the ever-evolving landscape of modern networking.

Topics: Artificial Intelligence, Infrastructure
10:00 - 10:50 AM

[1 CPE] How to Stop East/West Attacks in Your Data Center

  Presented by Aruba Networks

70% of all breaches are caused by endpoint security vulnerabilities, followed by lateral movement in the data center. Halt that hacker traffic. Attend this session to learn about a new category of data center switch that combines best-of-breed L2/3 switching with the industry's first hardware-accelerated programmable processor. This new tool augments your malware and ransomware detection and response capabilities by delivering stateful firewall services inline, at scale, with wire-rate performance and orders of magnitude improvement over traditional data center L2/3 switches. You will learn how to gain visibility and enforce security policy for all East/West flows between workloads to protect the critical assets in your data center.

Topics: Data Center Technology
11:00 - 11:50 AM

[1 CPE] How to Simplify and Secure Your Network & What You Need to Know About Wi-FI 6e

  Presented by Matt Helm, Sr Systems Engineer  • Extreme Networks

During the presentation, we will discuss how to simplify your network and make it more secure by using the IEEE standard 802.1aq. We explain the standard, and how it is easier to use than traditional networking and much more secure. We will demo its simplicity and what makes it secure.

We will then move into Wifi 6e and how it is changing the way we must look at wireless deployments. We will discuss all the changes that it has brought us and what we must be planning for with the higher speeds that we will be able to achieve.

Topics: Information Security, Infrastructure
1:00 - 1:50 PM

[1 CPE] Create a Safe Security Culture

  Presented by Lynn Soeth, Service Manager, Security Services • High Point Networks

You have a company-wide security culture. Is it a positive one? A safe security culture includes practices, policies, and attitude that prioritize the protection of sensitive information and the well-being of team members. It involves creating a positive environment where everyone feels empowered to ask questions and report potential security incidents. Using real world situations, let’s look at how you can actively participate in and grow a safe security culture at work and home.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Don’t Pay the Ransom

  Presented by Rubrik

The Rubrik team will provide an overview of what they are seeing in the market. What questions data protection teams and IT leaders are being asked concerning the uptick in cyber events. We will pull back the curtain to explain how Rubrik detects ransomware, identifies sensitive data, and searches for indicators of compromise with threat hunting. If time allows, we will dive into the Rubrik interface and show you how we accomplish this in a single secure interface.

Topics: Information Security
Travis LightTravis LightCybersecurity Advisor, CISA
3:00 - 3:50 PM

[1 CPE] The Trek Toward Zero Trust

  Presented by Travis Light • Cybersecurity Advisor, CISA

You have heard the buzz phrase “zero trust”, but what exactly is it? Join Travis Light for a breakdown of zero trust using a case study that highlights the pitfalls of the traditional “castle-and-moat” perimeter approach to network design. He’ll also discuss CISA’s zero-trust Maturity Model (ZTMM) 2.0. The ZTMM is a roadmap that organizations can follow as they transition towards a zero-trust architecture.

Travis Light serves as a Cybersecurity Advisor (CSA) in Montana for the Integrated Operations Division (IOD) of the Cybersecurity and Infrastructure Security Agency (CISA). He supports the CISA mission of strengthening the security and resilience of the nation's critical infrastructure in Region VIII. His daily responsibilities include coordinating cyber preparedness information sharing and collaboration, developing risk mitigation strategies, responding to cyber incidents, and providing cyber security resources including conducting strategic and technical assessments.

Before joining CISA in January 2023, Travis spent nine years as a federal employee with the Montana Army National Guard (MTARNG) in a variety of technical positions covering network administration, enterprise architecture, telecommunications infrastructure, database administration, and information systems security for classified and unclassified enclaves in the Regional Network Enterprise Center and the state's Data Processing Center.

Travis holds numerous professional industry certifications including GIAC Security Leadership Certification (GSLC), GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Examiner (GCFE), Cisco Certified Network Associate (CCNA), Cisco Certified Design Associate (CCDA), ITIL 4 Foundation, CompTIA Secure Infrastructure Specialist, and CompTIA Project+. He has earned a Bachelor of Science in Network Operations and Security from Western Governors University.

Topics: Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] Beyond the Backup: A Guide to Resiliency Program Development

  Presented by CompuNet

If you follow the news, it is easy to see – disruptive events affecting critical business operations are becoming more prevalent. In this presentation, our guests from CompuNet will step through a comprehensive framework for Business Continuity & IT Disaster Recovery Program development, highlighting methodology that integrates with cybersecurity risk management and builds upon the capabilities of an organization’s backup strategy. For context, CompuNet’s presenters will examine the technical and non-technical challenges organizations may face during cybersecurity events and how resiliency planning can help mitigate those challenges..

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Zero Trust—Let’s Dive into Security

  Presented by Kevin Heide, Director of Enterprise Networking • Cerium Networks

Spend the morning with us while we explore the world of Zero Trust Architecture—but with a twist. Instead of a high-level overview of this strategic cybersecurity approach, we'll get hands-on and show you practical examples using tools and environments that most of us are already familiar with.

Buckle up and join us on this exciting journey as we learn how to integrate different elements and policies across our organizations. We'll also focus on optimizing our policies and enhancing threat protection.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Seeing Your Attack Surface Through the Eyes of an Adversary

  Presented by Palo Alto Networks

Modern attack surfaces are dynamic. Without clear visibility that is constantly updated, it is all too easy to have persistent exposures and unmanaged assets. Security practitioners can only be as good as the data they have, so having a strong foundation of continuous discovery and monitoring ensures you can keep up with modern, dynamic attack surfaces to find, prioritize, and mitigate exposures as they arise.

Topics: Information Security
12:00 - 12:50 PM

[1 CPE] Panel: Retaining Your IT Staff in Montana, Can it Be Done?

  Presented by INTERFACE Advisory Council

“The other company is offering higher wages. I get to work remotely as much as I want, and I am getting a four-day workweek. Sorry, but I must take it.” Have you heard this just a few times? So many IT hiring managers are having to find creative ways to keep staff members in-house. While budgets and major company overhauls can’t always be achieved, some methods can help.

Montana has some of the most unique challenges in the country for retaining staff. Join the INTERFACE Advisory Council for an open conversation on how to keep your Montana IT staff intact. This panel features local area IT hiring managers and leaders that deal with these challenges in their shops. Bring your questions as there will be an opportunity to get advice on the needs you have.

Panelists

  • Jerry Rapp, Chief Information Officer, Town Pump
  • Kyle Rholl, Vice President, Information Technology, Clearwater Credit Union
  • Ryan Schoppe, Director, Information Technology One Health
  • Fred Wiegand, Director, Information Security, Stockman Bank of Montana
Topics: Culture
1:00 - 1:50 PM

[1 CPE] Intune: What’s New and What’s Next

  Presented by Chris McDuffie, Vice President of Cloud Architecture • Structured

Microsoft Intune is quickly becoming a strategic part of not only device management, but compliance and security as well. Structured will cover what’s new and how Intune will impact your Windows PC strategy management.

Topics: Infrastructure
2:00 - 2:50 PM

[1 CPE] Networking Deep Dive: Moving Beyond 192.16

  Presented by Pine Cove Consulting

In the world of networking, where devices and vendors multiply, IT specialists face the challenge of supporting and troubleshooting a wide array of equipment. To provide IT professionals with a comprehensive understanding of network complexities and best practices, this presentation will:

  • Highlight the impact of broadcast and multicast on network performance and strategies for efficient management
  • Discuss VLAN best practices, emphasizing the importance of segregating network traffic to enhance security and optimize performance
  • Explore the growing demand for and challenges associated with Power over Ethernet (PoE) and provide insights into effectively managing power requirements
  • Review the advantages and disadvantages of wireless connectivity compared to wired connections for specific devices and scenarios
  • Emphasize the importance of DHCP (Dynamic Host Configuration Protocol) in network management, as well as the role of ARP (Address Resolution Protocol) and MAC-address tables in troubleshooting network issues
  • Examine vendor remote access as a critical aspect of network administration, addressing the challenges and best practices associated with granting remote access to external vendors for troubleshooting and support
  • Explain LLDP (Link Layer Discovery Protocol), CDP (Cisco Discovery Protocol), and LLDP-MED (Link Layer Discovery Protocol-Media Endpoint Discovery) policies, highlighting their significance in network discovery and device configuration
  • Explore the uses of SNMP (Simple Network Management Protocol), focusing on its role in network monitoring, performance management, and device configuration
  • Discuss Syslog, both local and remote, as a valuable tool for collecting and analyzing network event logs, aiding in troubleshooting and security investigations
  • Examine the placement of cameras and access control systems on the network, and the considerations for parallel networks, to ensure optimal security and performance
  • Acknowledge the challenges of implementing Voice over IP (VoIP) systems, highlighting the complexities, and emphasizing the importance of proper planning and configuration

By delving into these topics, this presentation equips IT professionals with valuable insights and practical knowledge for managing and troubleshooting complex networks. It aims to deepen their understanding of network intricacies, empowering them to make informed decisions and optimize network performance and security.

Topics: Infrastructure

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Mike Bousliman
Chief Information Officer
MT Dept of Transportation

Brett Bratland
Sr Manager, IT Service Management
First Interstate Bank

Tim Capps
Manager, Systems Administration
Montana State University

Jeremy Champion
Manager, Information Technology
Simkins-Hallin

Bill Day
Manager, IT Infrastructure
Washington Corporations

Jason Emery
Chief Information Officer
Missoula County, MT

Kevin Gilbertson
Chief Information Officer
State of Montana

Mark Hinman
Director, Infrastructure
Town Pump

Adrian Irish
Information Security Officer
University Of Montana

Margaret Kauska
Chief Security Officer
MT Dept of Revenue

Shane Kolwyck
Director, Information Technology
Torgerson’s LLC

Ken Marshall
Manager, Application & Development
Missoula County, MT

Peter Martinson
Managing Director, Strategic IT
Montana State University

Andy Metroka
Chief Information Officer
Kampgrounds of America, Inc.

Paul Morton
Manager, Data Center & Disaster Recovery
Washington Corporations

Anthony Petzold
Manager, Information Technology
Mountain View Coop

Jerry Rapp
Chief Information Officer
Town Pump

Kyle Rholl
Vice President, Information Technology
Clearwater Credit Union

Zach Rossmiller
AVP/Chief Information Officer
University Of Montana

Ryan Schoppe
Director, Information Technology
One Health

Mark Van Alstyne
IT Business Operations Bureau Chief
MT Dept of Transportation

Brett Weisz
Chief Information Officer
Montana State University Billings

Fred Wiegand
Director, Information Security
Stockman Bank of Montana

Tyler Webb
Technical Lead
Freddie Mac

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Pine Cove Consulting

Pine Cove Consulting

Pine Cove Consulting
Pine Cove Consulting has serviced educational institutions, government agencies, and businesses across the Rocky Mountain Region since 1993. Pine Cove is a Sophos Platinum Partner and offers a suite of cybersecurity products to protect your organization.
Visit Website
Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

Cerium Networks

Cerium Networks

Cerium Networks
Cerium is a recognized innovator and leading provider of a full suite of collaboration, contact center, networking, data center, and security solutions. We help medium to large businesses in the Northwest plan for and then realize the positive impact of technology on their business operations, strategies, and user experiences.
Visit Website
CompuNet

CompuNet

CompuNet
CompuNet is a leading U.S. information technology partner, headquartered in Boise, Idaho. The firm specializes in consultation, design and implementation services specifically tailored to solve business problems. With a best-in-class engineering staff and approach, CompuNet focuses on building lasting relationships that prioritize client satisfaction over sales through every step of the journey.
Visit Website
Extreme Networks

Extreme Networks

Extreme Networks
Extreme Networks, Inc. (EXTR) delivers software-driven networking solutions that help IT departments everywhere deliver the ultimate business outcome: stronger connections with customers, partners and employees.
Visit Website
High Point Networks

High Point Networks

High Point Networks
High Point Networks is a leading provider of information technology solutions in both SMB and enterprise-level markets, servicing customers from coast to coast.
Visit Website

BRONZE SPONSORS

Adlumin

Adlumin

Adlumin
Adlumin's security and compliance automation platform helps organizations manage evolving threats and cybersecurity compliance requirements.
Visit Website
APC by Schneider Electric

APC by Schneider Electric

APC by Schneider Electric
APC, a flagship brand of Schneider Electric, provides clean battery backup power, surge protection and IT physical infrastructure inside and outside the traditional IT environment. Through APC brand products and solutions, they offer certainty in a connected world. Certainty that their reliable, integrated physical infrastructure solutions are based on the fundamental premise that your data and information should —and always will be —accessible.
Visit Website
baramundi

baramundi

baramundi
baramundi Software offers efficient, secure, and cross-platform management of workstation environments. With over 20 years of UEM experience across the globe, over 4,000 customers benefit from our intuitive, single-interface platform.
Visit Website
Critical Start

Critical Start

Critical Start
Critical Start Managed Cyber Risk Reduction solutions ensure continuous security monitoring and mitigation, delivering robust protection against threats. With our platform’s maturity assessments, event analytics, response capabilities, and a team of expert risk mitigators, achieve the highest level of cyber risk reduction and increase confidence in attaining desired security maturity.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet helps organizations across the public and private sectors protect the systems, data, and services that keep businesses and communities running. From government agencies and schools to enterprises and service providers, leaders rely on Fortinet to secure critical infrastructure, ensure operational continuity, and defend against evolving cyber threats. Our Security Fabric platform unifies networking and security to deliver the visibility, control, and efficiency organizations need to operate confidently, whether virtual, in the cloud, or on-premises.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
ImageSource

ImageSource

ImageSource
ImageSource is a software and systems integration firm specializing in Enterprise Content Management.
Visit Website
LMG Security

LMG Security

LMG Security
LMG Security is your one-stop shop for proactive cybersecurity! Our expert team speaks and trains at major global conferences, and has been featured in the Wall Street Journal, Today Show, and New York Times! With LMG Security, you receive cutting-edge cybersecurity guidance and services.
Visit Website
NinjaOne

NinjaOne

NinjaOne
NinjaOne is a leading unified IT operations solution that simplifies the way IT teams work. With NinjaOne, MSPs and IT departments can automate, manage, and remediate all their endpoint management tasks within one fast, modern, intuitive platform, improving technician efficiency and user satisfaction.
Visit Website
Optiv

Optiv

Optiv
Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential.
Visit Website
Qumulo

Qumulo

Qumulo
Qumulo, the leader in data-aware scale-out NAS, helps CIOs and storage administrators store, manage and curate enormous numbers of digital assets.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website
Sevco Security

Sevco Security

Sevco Security
Sevco is the cloud-native CAASM platform delivering the industry’s most accurate, real-time IT asset inventory. Hundreds of companies rely on Sevco's 4D Asset Intelligence engine to bridge the gap between IT and security teams. By providing a continuously updated inventory of assets, Sevco autonomously identifies and closes previously unknown security gaps, while dramatically improving incident response. Sevco’s patented asset telemetry uncovers significant security gaps and out-of-compliance assets in every deployment without fail. Founded in 2020 and based in Austin, Texas.
Visit Website
TDS Telecom

TDS Telecom

TDS Telecom
TDS Telecommunications LLC (TDS Telecom/TDS®) delivers high-speed internet, TV entertainment, and phone services to a mix of rural and suburban communities throughout the U.S. With 1.2 million connections, TDS is a rapidly growing technology company. Powered by fiber-optics and new industry-leading technologies, TDS delivers up to 8 Gigabit internet speeds and offers internet-protocol based TV entertainment solutions along with traditional phone services. TDS also offers businesses VoIP advanced communications solutions, dedicated internet service, data networking, and hosted-managed services.
Visit Website
ValorC3

ValorC3

ValorC3
ValorC3 is a modern data center, cloud and connectivity partner that delivers agile, scalable IT solutions tailored to the relentless mid-market enterprise. Valor meets clients where they’re at and gets them where they need to grow, helping them navigate the rapidly changing digital landscape with flexible, high-density data centers, extensive infrastructure expansion capabilities, low latency networks, strong partnerships and decades of industry expertise.
Visit Website

EXHIBITORS & ASSOCIATIONS

ByteSpeed

ByteSpeed

ByteSpeed
ByteSpeed has been providing IT Solutions, including custom built hardware, networking solutions, and professional IT services in all 50 states in the US since 1999. https://bytespeed.com/
Visit Website
Dell

Dell

Dell
Dell Technologies (NYSE:DELL) helps organizations and individuals build their digital future and transform how they work, live and play. The company provides customers with the industry’s broadest and most innovative technology and services portfolio for the data era.
Visit Website
eSentire

eSentire

eSentire
eSentire’s complete, multi-signal Managed Detection and Response services provide 24/7 cutting-edge protection to prevent cybercriminals from ever disrupting your business.
Visit Website
ESET

ESET

ESET
For more than 30 years, ESET® has been developing industry-leading IT security software and services to protect businesses, critical infrastructure, and consumers worldwide.
Visit Website
Everpure

Everpure

Everpure
Create an Enterprise Data Cloud that unifies access, simplifies management, and unlocks the value of your data—only with the Everpure platform.
Visit Website
FNTS

FNTS

FNTS
FNTS is a trusted multi-cloud and managed IT services provider with a proven 25-year history supporting mainframe environments and a wide range of operating systems, including Windows, Linux, Unix AIX and iSeries. We also provide elevated layered security solutions to industries with strict regulations and compliance requirements.
Visit Website
Horizon3.ai

Horizon3.ai

Horizon3.ai
Horizon3.ai enables organizations to continuously assess the security posture of their enterprise across many attack surfaces.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
Insight

Insight

Insight
Insight is a leading solutions and systems integrator — providing computer hardware, software, cloud solutions and IT services to business, government, education and healthcare clients.
Visit Website
Lenovo

Lenovo

Lenovo
Lenovo is one of the world's leading personal technology companies, producing innovative PCs and mobile internet devices. A global Fortune 500 company, Lenovo is the world's largest PC vendor and fourth largest smartphone company.
Visit Website
LGIT

LGIT

LGIT
The Local Government Information Technology group consists of Montana City and County IT staff. LGIT meets quarterly to discuss IT issues and topics that are of interest to Local Government.
Visit Website
LogRhythm

LogRhythm

LogRhythm
LogRhythm, Inc. is an independent security intelligence company that integrates security information and event management, log management, file integrity monitoring, network forensics, and host forensics.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website
PMI Montana

PMI Montana

PMI Montana
The PMI Montana Chapter is a non-profit group of professionals who are interested in learning more about project management, finding mentors, peers and new contacts. We are part of the world’s leading project management organization with over 600,000 Global Members and over 300 Local Chapters Internationally.
Visit Website
Proofpoint

Proofpoint

Proofpoint
Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.
Visit Website
Rain Networks

Rain Networks

Rain Networks
Rain Networks is a Value-Added-Distributor located near Seattle, Washington. The company was founded in 2003 with the vision of bringing the world's best technology products to the people that need them to make their business run more efficiently.
Visit Website
Ruckus Networks

Ruckus Networks

Ruckus Networks
Ruckus Networks is redefining connectivity around the globe. We build secure wired and wireless access networks for organizations that place a premium on connectivity experiences for end-users as well as simplicity and lower-cost-per-connection for IT.
Visit Website
SentinelOne

SentinelOne

SentinelOne
SentinelOne is the future of Endpoint Protection. It unifies prevention, detection and response in a single platform driven by sophisticated machine learning and intelligent automation. It can adapt your defenses against the most advanced cyber-attacks.
Visit Website
Spectrum Business

Spectrum Business

Spectrum Business
Spectrum Business® delivers a complete portfolio of secure connectivity solutions for small and mid-market businesses and caters to the unique needs of large businesses, communications service providers and government entities. Our industry-leading experts align our products to the needs of each customer, drawing from our full suite of services including internet solutions over hybrid fiber-coax and 100% fiber, video and voice solutions including phone and mobile, as well as unified communications and managed services tailored for our mid-market and large enterprise customers.
Visit Website
Verkada

Verkada

Verkada
Verkada provides cloud-managed security solutions—video surveillance, access control, alarms, and more—designed to simplify physical security and deliver real-time insights for safer, smarter buildings.
Visit Website

Interested in becoming part of our next Montana event?

CONTACT US FOR INFO

Montana

Montana State University
Strand Union Building
751 W. Grant Street
Bozeman, MT 59715

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.