F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

INTERFACE Virtual Nashville Birmingham 2021 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

June 10th, 2021
8:30am – 4:30pm

Virtual Conference
Multi-track seminars with Q&A
1-on-1 chat and networking
Hourly prize drawings

KEYNOTE: [1 CPE] Preparing Your Security Program

  Presented by Peter Gallinari • Enterprise Information Security Officer, State of Tennessee

Seminar Schedule

  • Theater One
  • Theater Two
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Ransomware In Focus: How AI Surgically Contains the Threat

  Presented by Darktrace

In the immediate aftermath of a ransomware attack, executives too often face a difficult dilemma: either pay a ransom or shut down critical systems and services. In today’s increasingly complex digital ecosystems, the collateral damage that ensues from ransomware attacks can be broad-ranging and destructive, with organizations taking days, weeks, or even months to recover.

But what if there was another way out – a way to surgically contain ransomware in its earliest stages, without disrupting normal business operations? Join this presentation to learn how Cyber AI is helping thousands of organizations fight back against ransomware. We’ll discuss:

  • The impact of ‘double-extortion’ ransomware and ‘ransomware-as-a-service’
  • Real-world examples of ransomware detected by Cyber AI
  • How self-learning AI responds proportionately to ransomware, thanks to its deep understanding of an organization’s pattern of life
Topics: Information Security
10:00 - 10:50 AM

[1 CPE] You Are No Longer Forgotten: The Small Business Security Challenge

  Presented by Chris Roberts • Chief Security Strategist, Cynet

Most of the security industry is chasing “around” 31,000 larger enterprise sized companies for their business. The list is well known, circulated and targets are on the backs of ALL the C-Suite, most of the technical folks and the MSP/VARS that support them. The Security industry circles them like packs of hyena or vultures waiting for one of them to fall, get breached, or for a vendor to be thrown out… pouncing on the fresh kill with glee…

Meanwhile, you’re sitting there getting slaughtered by every adversary known to mankind because you ARE the forgotten, you’re too small for the multi-billion $$ cyber companies whom IF they decide to deal with you will flood you with MSA’s, SOW’s and NDA’s that would take a week’s worth of lawyer time JUST to understand, let alone realize that they’re not accountable for anything, unlikely to want to support you and in all honestly you’ll get a 1-800-YOU-AREN’T-SPECIAL number as your sole source of support.

We’re going to address the current situation, the state of play, and give you some thoughts, suggestions, ideas AND plans. We’ll provide resources on HOW to evaluate, where to look, what to do AND importantly we’ll do it because it’s what we’re doing. We live, breath and deal with this daily. We’ve sat in the meetings when the large cybersecurity companies state, “we’re done dealing with the SMB market” and we’ve got the battle scars from dealing with those subsequent consequences.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Encrypted and Exfiltrated: Navigating the Worst-Case Scenario

  Presented by ThinkGard

ThinkGard recently had the opportunity to assist an organization that found itself in a situation that nobody wants to. Their network had been infiltrated by bad actors who then exfiltrated over 400GB of sensitive client and employee data just before encrypting all the machines on their network with ransomware. The exfiltrated data was subsequently released to the dark web where it was located by a cyber security website that wrote an article about it. This situation is just about as bad as you can imagine. Our presentation is a deep-dive case study of what happened, how it happened, how it could have been prevented, and how they ultimately recovered, complete with timelines, screenshots from the hackers, info from the ISP, and more. The twists and turns in this story are incredible. You don’t want to miss it.

Topics: Information Security
12:00 - 12:50 PM

[1 CPE] Surviving Phishing, Distributed Denial of Service, and Ransomware Attacks

  Presented by Curtis Carver • CIO for University of Alabama at Birmingham

This presentation examines actual phishing, distributed denial of service, and ransomware attacks against a research university in the last 24 months. In the case of the DDOS and ransomware attacks, these were multi-month attacks that morphed over time. Come learn what worked and did not work against the three most common forms of attack today and then participate in a conversation on what will work at your organization in preparing for, detecting, and defeating these attacks.

Dr. Curtis Carver was named Vice President for Information Technology and Chief Information Officer in June 2015, following a national search. In this role as a servant leader and enabler of others, he leads a team of dedicated professionals who support UAB’s mission by providing world-class IT solutions with a focus on innovation, agility, and cost-efficiency. A senior leader in higher education information technology, Dr. Carver came to UAB from his position as Vice Chancellor and Chief Information Officer for the Board of Regents of the University System of Georgia, having previously held key leadership positions at the U.S. Military Academy at West Point. Dr. Carver earned a bachelor’s degree in computer science from the U.S. Military Academy at West Point and his master’s degree and doctorate in computer science from Texas A&M University. Throughout his career, he has received numerous national and international honors and awards for military, teaching, and research excellence. Dr. Carver is a frequent keynote speaker and has published extensively.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Disaster Recovery Reality Check: Validating Your DR Strategy

  Presented by StorageCraft

Do you have a DR strategy? Learn more from those on the inside of data protection and disaster recovery. See how you compare to other’s DR capabilities and how to build a solid strategy. We’ll also cover key DRaaS capabilities and a solution to make part of our plan.

Topics: Business Continuity / Disaster Recovery
2:00 - 2:50 PM

[1 CPE] The Evolution of Vulnerability Management

  Presented by Optiv Security & Tenable

A proactive, risk-driven Vulnerability Management approach delivers comprehensive, continuous visibility and informs technical and business decisions. Join Tenable’s Nathan Wenzler and Optiv’s Doug Drew (a respected Tenable Guardian) as they discuss real-world VM challenges and how to manage and measure your cyber risk.

Topics: Information Security, Strategic Management
Peter GallinariPeter GallinariEnterprise Information Security Officer, State of Tennessee
3:00 - 3:50 PM

[1 CPE] Preparing Your Security Program

  Presented by Peter Gallinari • Enterprise Information Security Officer, State of Tennessee

Join Peter Gallinari for a “how-to” in building your program. He will begin by identifying key components for the foundation of a security program:

  • Security Awareness
  • Security Frameworks: NIST, ISO as an example
  • Vulnerability Management
  • Incident Response Tabletops / Disaster Recovery

Also covered: moving data to the cloud and all the preparations needed, including custom security controls. Finally, Peter will provide a recap of security issues dealt with during the pandemic and key takeaways.

Regardless of where you are in your IT career, learn from an established IT veteran who has insights to share!

Peter Gallinari has over 44 years of experience in Information Technology, with 25+ years as a professional leader in the field of Data Privacy, Cyber Security & Compliance. Industry expertise in Financial Services, Health Care and Government Sectors. He has held positions as Chief Data Privacy Officer (Government), Domain Information Security Officer (Government), former Chief Security Officer at GE Capital and GE IT Director of Operations, and former Chief Security Officer supporting 3 hospitals in New York. Regulatory compliance leader for GLBA, SOX, HIPAA, FISMA, FERPA, FTI, CJIS, SSA, EU Privacy Directive (GDPR), Commercial compliance for PCI. Subject matter participant in support of Cloud innovative solutions (how to prepare to meet compliance). Keynote speaker for cybersecurity conferences, both public and private sector audiences.

Topics: Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] Disaster Recovery Reality Check: Validating Your DR Strategy

  Presented by StorageCraft

Do you have a DR strategy? Learn more from those on the inside of data protection and disaster recovery. See how you compare to other’s DR capabilities and how to build a solid strategy. We’ll also cover key DRaaS capabilities and a solution to make part of our plan.

Topics: Business Continuity / Disaster Recovery
10:00 - 10:50 AM

[1 CPE] The Evolution of Vulnerability Management

  Presented by Optiv Security & Tenable

A proactive, risk-driven Vulnerability Management approach delivers comprehensive, continuous visibility and informs technical and business decisions. Join Tenable’s Nathan Wenzler and Optiv’s Doug Drew (a respected Tenable Guardian) as they discuss real-world VM challenges and how to manage and measure your cyber risk.

Topics: Information Security, Strategic Management
11:00 - 11:50 AM

[1 CPE] Endpoint Systems Management: Time to Rethink

  Presented by Quest

See the recent changes to Endpoint environment and how these affect your infrastructure. Learn how these changes affect your network design and what this means for your daily business. Learn more about the new technologies available for managing your endpoints and see some tips and guidelines to be prepared for what’s next.

Topics: Infrastructure
1:00 - 1:50 PM

[1 CPE] How Zero-Trust Enables the Future of “Work from Anywhere” Secure Access

  Presented by Duo Security

The perimeter-focused security model of decades past is no longer adequate for securing the modern enterprise. Now, organizations must secure a mobile workforce using a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks — and this trend only accelerated during 2020's global shift to remote work. Fortunately, a modern access strategy built on zero-trust fundamentals can defend today’s workforce while paving the way to a passwordless future. Attend this session to learn how the zero-trust access model works, reduce your reliance on passwords and risk of password-based attacks, and how to start planning and staging your zero-trust evolution today.

Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Ron Balcarras
Sr Manager II, Data Management
Deloitte

Craig Browning
Director, Cloud Services
Concord Music

Ryland Byars
Director, IT & Security
Medical Properties Trust

Dale Callahan
Director, Information Engineering; Professor
University of Alabama at Birmingham

Curt Carver
Vice President, Chief Information Officer
University of Alabama at Birmingham

Keith Chapple
Director, Information Technology
Cory Watson Attorneys

Damian Clarke
Chief Information Officer
Alabama A&M University

Dave Cummings
Security / Identity Architect
HCA Healthcare

Paul Currie
Vice President, Chief Technology Officer
HCA Healthcare

Doug Finch
Manager, Technology Services
Tennessee Baptist Mission Board

Peter Gallinari
Enterprise Information Security Officer
State of Tennessee

Dwayne Gannon
Director, Technical Operations
Bass, Berry & Sims

Steve Hackney
Director, BA Center of Excellence
HCA Healthcare

Kevin Harris
Director, Cybersecurity Program
American Public University Systems

Kevin Hicks
Vice President, Information Technology
M. J. Harris Construction Services, LLC

Janiece Holloway
Sr Manager, Operations Systems
Girls Inc. of Central Alabama

Lisa Maher
Director, Grants & Contracts
Children’s Aid Society of Alabama

Dave (Joe David) McDowell
Sr Application Developer
Vanderbilt University Medical Center

Joseph Mwangi
Manager, Information Technology
Birmingham-Jefferson Convention Complex

Larry Peck
Manager, Disaster Recovery Program
Premise Health

Kevin Ray
Director, Information Technology
O’Neal Industries

Mark Ridings
Director, Information Technology
TN Wildlife Resources Agency

Richard Russell
Director, Information Security
Built Technologies

John Taylor
Manager, Global Cybersecurity
Deloitte

Matt Townsend
Sr Project Manager
North Highland

Tommy York
Manager, Engagement
HCA Healthcare

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Optiv

Optiv

Optiv
Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential.
Visit Website
StorageCraft

StorageCraft

StorageCraft
Arcserve is a global top 5 data protection vendor with best-in-class solutions that manage, protect, and recover all data workloads, from SMB to enterprise and regardless of location or complexity. A 100% channel-centric organization, Arcserve has a presence in over 150 countries, with 19,000 channel partners and 235,000 customers.
Visit Website
Tenable

Tenable

Tenable
Tenable, Inc., is the Cyber Exposure company. Over 30,000 organizations around the globe rely on Tenable to understand and reduce cyber risk.
Visit Website

SILVER SPONSORS

Cynet

Cynet

Cynet
Cynet 360 is the world's first Autonomous Breach Protection platform that natively integrates XDR endpoint, user and network attack prevention and detection capabilities with an incident engine that fully automates investigation and remediation actions, backed by a 24/7 world - class MDR service. End to end, fully automated breach protection is now within reach of any organization, regardless of security team size and skill level.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
Duo Security

Duo Security

Duo Security
Duo Security, now part of Cisco, is the leading multi-factor authentication (MFA) and secure access provider. Duo is a trusted partner to more than 25,000 customers globally, including Facebook, Yelp, Zillow and more.
Visit Website
Quest Software

Quest Software

Quest Software
At Quest, we solve complex problems with simple solutions. Our philosophy is focused on great products, great service and being simple to do business with. We deliver technology that eliminates the need to choose between efficiency and effectiveness.
Visit Website
ThinkGard

ThinkGard

ThinkGard
Unlike ordinary service providers, Data Protection such as Backup and Disaster Recovery & Cyber Security is all we do. We don’t take over IT departments. We’re in the business of protecting them. Give us 15 minutes and you’ll know if we’re right for you!
Visit Website

BRONZE SPONSORS

Okta

Okta

Okta
Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology— anywhere, on any device or app. Organizations trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, government, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations.
Visit Website
WatchGuard

WatchGuard

WatchGuard
For 25 years, WatchGuard Technologies has pioneered easy-to-deploy and easy to manage solutions. With industry-leading network security, secure Wi-Fi, MFA, Endpoint and network intelligence products and services for more than 250,000 companies. In a world where the cybersecurity landscape is constantly evolving, and new threats emerge each day, WatchGuard makes enterprise-grade cybersecurity technology accessible for every company.
Visit Website

EXHIBITORS & ASSOCIATIONS

ASIS Middle Tennessee

ASIS Middle Tennessee

ASIS Middle Tennessee
Our goal is to professionalize the Security industry in the Mid-Tennessee region by providing information and training to our membership while being available for expert assistance and guidance.
Visit Website
InfraGard Birmingham

InfraGard Birmingham

InfraGard Birmingham
InfraGard is an organization that is building a Trust Relationship between those individuals who are involved in protecting our nation’s Critical Infrastructures, and the FBI and other government partners.
Visit Website
InfraGard Middle Tennessee

InfraGard Middle Tennessee

InfraGard Middle Tennessee
InfraGard is a partnership between the FBI and the private sector that began in 1996. The Middle Tennessee InfraGard Members Alliance began in 2005 and works in partnership with the Nashville FBI field office at 2868 Elm Hill Pike, Nashville, TN 37214.
Visit Website
ISACA Birmingham

ISACA Birmingham

ISACA Birmingham
The Birmingham Chapter of ISACA meets to discuss issues concerning business controls and data security. Meetings include guest speakers with experience in fields such as programming, operating systems, system development, and data security.
Visit Website
ISACA Middle Tennessee

ISACA Middle Tennessee

ISACA Middle Tennessee
The Middle Tennessee Chapter was founded in 1986. The chapter exists to create and promote programs which enhance our members' professional and personal lives through practical and timely industry education, networking opportunities, and materials.
Visit Website
Nashville Technology Council

Nashville Technology Council

Nashville Technology Council
NTC exists to be a catalyst for the growth of Middle Tennessee’s tech industry. By connecting, uniting, developing, and promoting our community, we propel the Nashville area forward to become a leader in technology-based innovation and development.
Visit Website

Interested in becoming part of our next Nashville Birmingham event?

CONTACT US FOR INFO

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.