F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Virtual Omaha 2021 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

November 10th, 2021
8:30am – 4:30pm

Virtual Conference
Multi-track seminars with Q&A
1-on-1 chat and networking
Hourly prize drawings

KEYNOTE: [1 CPE] Building Your Network: Role Models, Mentors, Coaches, and Sponsors

  Presented by Terri-Anne Wallen • Chief Risk Officer, CSG

Seminar Schedule

  • Theater One
  • Theater Two
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Ransomware In Focus: How AI Surgically Contains the Threat

  Presented by Darktrace

In the immediate aftermath of a ransomware attack, executives too often face a difficult dilemma: either pay a ransom or shut down critical systems and services. In today’s increasingly complex digital ecosystems, the collateral damage that ensues from ransomware attacks can be broad-ranging and destructive, with organizations taking days, weeks, or even months to recover.

But what if there was another way out – a way to surgically contain ransomware in its earliest stages, without disrupting normal business operations? Join this presentation to learn how Cyber AI is helping thousands of organizations fight back against ransomware. We’ll discuss:

  • The impact of ‘double-extortion’ ransomware and ‘ransomware-as-a-service’
  • Real-world examples of ransomware detected by Cyber AI
  • How self-learning AI responds proportionately to ransomware, thanks to its deep understanding of an organization’s pattern of life
Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Ransomware: Who, What, Why & How…

  Presented by Check Point Software

Over the last 12 months, ransomware attacks surged by 93% with a devastating impact on businesses and industries worldwide. In today’s hybrid IT environment, preventing ransomware attacks seems like an impossible feat. But is it?

In this session, we will cover the latest ransomware trends and how you can protect your organization from falling victim to sophisticated ransomware attacks.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Ransomware Resilience: Best Practices to Prepare, Mitigate, and Recover

  Presented by Zerto

Large organizations are still being forced to pay ransoms due to ransomware attacks. Disruptions to services and supply chains are putting ransomware victims in the news under a negative spotlight. Join recovery and resilience experts from Zerto to discuss best practices to minimize downtime and avoid paying ransoms by being prepared. In this session, you’ll learn:

  • Ransomware 101: A breakdown of a ransomware attack and how it affects systems
  • What steps you can take to reduce the likelihood of attacks on your system
  • How to best choose a recovery solution for ransomware
  • How you can best harden your recovery systems against attacks
  • How to create a recovery plan to react and recovery quickly
  • How a company hit twice by ransomware improved recovery time from weeks to minutes by planning ahead
Topics: Business Continuity / Disaster Recovery
12:00 - 12:50 PM

[1 CPE] Ransomware Decoded: Understanding & Preventing Modern Ransomware Attacks

  Presented by Cybereason

It's no secret that Ransomware presents an increasing danger to organizations--there has been a 105% increase in ransomware attacks since the beginning of COVID-19 alone, with 73% of those attacks being effective. Is your organization invested in the right defenses so that it does not fall victim to these costly and dangerous attacks?

If you’re concerned about ransomware, whether it’s beating today's advancing attacks, stopping data exfiltration, or preventing the latest trend of “double extortion,” this session is for you. Join Cybereason's Kraig Faulkner as he discusses the challenges faced by today's ransomware attacks and how to stay on top of these types of threats.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Organizational Risk Management: Measuring Privacy Risk

  Presented by Lisa McKee, Senior Manager Security and Privacy, Protiviti

Organizations globally are obligated under legal, regulatory, and industry standards to manage risk. There are many facets to risk that organizations must manage, such as financial, security, and privacy risks. Organizations are currently able to prioritize security risk by conducting qualitative and quantitative security risk assessments based on the threat, likelihood, and impact on an organization’s ability to continue business operations. However, privacy risk assessments currently lack a clear calculation for identifying and prioritizing privacy risk.

Key Points to be covered:

  • Understand the different risk domains, specifically, what is privacy risk
  • Learn methods to identify privacy risks and minimize privacy harms to individuals
  • Develop techniques for conducting a privacy risk assessment
  • Identify approaches to include privacy in organizational risk management programs
2:00 - 2:50 PM

[1 CPE] The Office of Tomorrow May Be Here Already

  Presented by INTERFACE Advisory Council

Since the start of the pandemic, your workflow and office structure have shifted tremendously. The way any firm operates now has adapted to the change in remote workers. We have seen return-to-office plans constantly changed, pushed backed, or completely scrapped. Has your company returned employees to the office? Are those plans on hold?

Join the INTERFACE Advisory Council for an open discussion about these items and more. Will your company have a large amount of staff permanently working remotely? Do you need more shared space workstations for employees? We will discuss some tips for preparing your IT staff for all the possible scenarios that will come your way.

Panelists

  • Rick Haugerud, Assistant Vice President, Information Technology Services, University of Nebraska
  • Matt Morton, Board Member, NebraskaCERT
  • Andrew Munger, Vice Chairman, Verterent
  • Jim Navin, Chief Information Officer, The Gavilon Group, LLC
  • Amber Roberts, Sr IT Support Analyst, The Gavilon Group, LLC
Terri-Anne WallenTerri-Anne WallenChief Risk Officer, CSG
3:00 - 3:50 PM

[1 CPE] Building Your Network: Role Models, Mentors, Coaches, and Sponsors

  Presented by Terri-Anne Wallen • Chief Risk Officer, CSG

In this presentation on building your network, we will provide an overview of the individuals you should connect with to support, develop, coach, and sponsor you. You will learn the unique differences between each of these roles and hear about real-life examples of the power that each can provide. Participants will then have the ability to identify these people in their own network. Further, the discussion will highlight the interconnection with imposter syndrome and illustrate how imposter syndrome exists for every single human. Terri-Anne and Andy will share their experiences to guide participants in understanding how they can approach individuals to be a mentor, coach, or sponsor and realize that asking is a form of flattery!

Terri-Anne Wallen:

Terri-Anne "TA" Wallen leads CSG's Enterprise Risk Management organization with responsibility for Risk, Compliance, and Internal Audit. In her role as Chief Risk Officer, she provides support and guidance to the business to achieve accelerated growth through risk assessment, analysis, and various audits. She joined CSG in 2005 and established CSG's Internal Audit and Risk Management functions. In her role, she increased capabilities and implemented efficiencies to meet dynamic business risks and the evolving needs of customers, built a strong, functioning team, and monitors risk mitigation across CSG's global, growing business. Before CSG, TA spent time with Protiviti performing Internal Audit outsourcing projects, assisting in establishing the Internal Audit function for both eBay and PayPal, and is a KPMG alumnus. She has 25+ years of experience in building and maintaining Internal Audit and 15+ years of experience in Risk Management program development and facilitation. TA graduated from the University of Nebraska – Omaha with a Bachelor of Science in Business Administration – Accounting. She obtained her CPA certification and is a member of the IIA. TA serves as an Executive Sponsor in CSG's first employee resource group, Women Engaged in Leadership, Education and Development (WE LEaD).

Andy Hinton:

Andy Hinton focuses on building relationships and providing value through independent and objective feedback on managing uncertainty; striving to turn risk into opportunity. In his current role at CSG, Andy leads a team of IT audit professionals through risk assessment, technology audits, and consulting.

Prior to CSG, Andy held audit roles at Bank of the West, TD Ameritrade, and Deloitte, where he performed IT, financial, and operational audits. With over 15 years of audit and information security experience, Andy has established himself as a trusted advisor to management. Andy holds Bachelor of Science in Business Administration and Master of Professional Accountancy degrees from the University of Nebraska – Lincoln and maintains several audit and security certifications. Andy has taught cybersecurity at Bellevue University, volunteers for the local ISACA chapter, and is a member of the Supervisory Committee at Centris Federal Credit Union.

Topics: Culture
  • Sessions
9:00 - 9:50 AM

[1 CPE] Security Operations Center: Build Your Own or SOCaaS

  Presented by High Point Networks

Learn how Security Operations as a Service (SOCaaS) may be a good option for your business. In this session, we will compare and contrast many non-product specific aspects of SOCaaS and traditional Security Information and Events Management (SIEM’s) systems using first- hand real-world examples; the good, bad, and ugly. The purpose of this presentation is to equip the audience with enough knowledge so they can make a more informed decision regarding a traditional SIEM/SOC approach, or SOCaaS approach, when building a Security Operations Center. Presenter Dean Sheley recently lead an initiative to build a Central Security Operations Center for a statewide multi-university educational system while CISO for that state-wide university system.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] What Does Identity Mean for Zero Trust? Dare I Say… Everything?

  Presented by Zirous & SailPoint

In recent years initiatives like digital transformation, business agility, and workforce continuity have increasingly forced technical decisions about how and where applications, services, and systems are hosted. As more critical applications and systems move to the cloud, identities and access are sprawled across these environments, making more sensitive data and resources available for exploitation by attackers. Amidst this increased risk and attack surface, Zero Trust has emerged as the paradigm for securing access to protected resources. At the heart of this problem is the need to know who is trying to access what and whether they should be able to, effectively making identity the new perimeter. In this presentation, we discuss how Zero Trust Security really means Identity Security and why IAM practices, like Multifactor Authentication, Identity Governance, and Privileged Access Management, play such a significant role in realizing a successful Zero Trust Security vision.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Thinking Upstream About White House Cybersecurity Executive Order 14028

  Presented by Tidelift

A few months ago, the U.S. White House released cybersecurity executive order 14028, an attempt by the United States government to use its purchasing power to create positive changes to the way cybersecurity is addressed around the world.

Recent high-profile breaches like the Colonial Pipeline ransomware attack or the SolarWinds software supply chain attack have shown that our cybersecurity defenses are woefully inadequate. This executive order forces a higher standard of cybersecurity for any organization selling software to the federal government, which in turn makes it the de facto global standard for all software in the future.

Tidelift CEO and co-founder Donald Fischer shares his perspective on how the cybersecurity executive order impacts software supply chain security. He’ll brief attendees on the key issues addressed by the executive order, including software bill of materials (SBOM), supply chain security, and provenance requirements. He’ll outline the gaps that most organizations will need to close to stay in compliance. And he’ll share a proactive approach to addressing open-source software supply chain health and security upstream.

If you want to ensure your organization is fully prepared for the coming changes, you won’t want to miss this session.

Topics: Information Security, Infrastructure
12:00 - 12:50 PM

[1 CPE] Immutable Storage: Level-Up Ransomware Readiness

  Presented by Arcserve & StorageCraft

IDC advises that a 3-2-1-1 strategy is the new best practice for effectively protecting customers against ransomware. The last 1 is the important piece of the puzzle, where a copy is also stored on immutable storage. The growing risk of compromise to your customers’ data – specifically via ransomware DEMANDS the most up to date and complete solutions arsenal.

Topics: Data Storage, Information Security
1:00 - 1:50 PM

[1 CPE] Endpoint Systems Management: Time to Rethink

  Presented by Quest Software

See the recent changes to the endpoint environment and how these affect your infrastructure. Learn how these changes affect your network design and what this means for your daily business. Learn more about the new technologies available for managing your endpoints and see some tips and guidelines to be prepared for what’s next.

Topics: Infrastructure, Strategic Management
2:00 - 2:50 PM

[1 CPE] Protect Your Applications and Data from Ransomware Threats

  Presented by Airgap Networks

Typical enterprise attack surface has dramatically increased post COVID19. Employees, contractors, and vendors have access to enterprise crown jewels over legacy and insecure VPN technology for their respective home environments. It is no wonder that we are witnessing a rapid increase in cybercrimes in the last 18 months. Is protecting your application and data your top priority? If so, please join us in the session to understand the threat landscape and various technology options to safeguard your assets.

We believe the fundamental issues faced by the organizations relate to excessive trust relationships over VLANs and VPNs. For better security, we must ensure that every transaction is authorized and authenticated, and we must make this happen without the need for a bunch of legwork.

Join us and learn more about our point of view on how you can protect your assets without forklift upgrades. Ritesh Agrawal, Co-Founder and CEO of Airgap Networks, will discuss industry leadership and provide a technology overview, addressing the following:

  • How does the modern Application Access approach compare to the traditional remote access VPN?
  • What’s the best method to deploy and operate Universal Secure Access Solution?
  • How to apply zero trust principles, especially for legacy protocols such as SSH, SMB, WMI, RDP, etc.?
  • What’s the importance of SSO/MFA authentication coupled with intent check?
  • Walkthrough (Demo) real-world use cases across private and public sectors.

Enjoy the INTERFACE event and we look forward to meeting you at the (virtual) booth.

Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Randy Behounek
Sr Vice President, Technology Risk
Bank of the West

Eric Carel
Manager, Information Security
Farmers Mutual of Nebraska

Krista Freimuth
Manager, IS Assets
Mutual of Omaha Insurance Company

Jay Gnuse
Director, Information Technology
Chief Industries

Rick Haugerud
Assistant Vice President, Information Technology Services
University of Nebraska

Andy Hinton
Manager, IT Audit
CSG International

Norm Kromberg
Vice President, Information Security
Southern Carlson Inc

Eric Matulka
Vice President, Information Technology
DEI Communities

Lisa McKee
Sr Manager, Security and Privacy
Protivit

Matt Morton
Board Member
NebraskaCERT

Trista Renstrom
Security Systems Engineer
WoodmenLife

Amber Roberts
Sr IT Support Analyst
Gavilon Group LLC

Tom Rolfes
Manager, Administrative Services
Nebraska Information Technology Commission

Daniel Schmidt
Sr Manager, IT Risk
Werner

Ron Strawn
Manager, Information Technology
Vanguard Research Inc

Brad Toland
Director, Technology
Election Systems and Software

Ed Toner
Chief Information Officer
State of Nebraska

Tim Trabold
Manager, Technical Services
Central States Indemnity

Luke Wentz
Manager, IT Security
Orion Advisor Solutions LLC

Sean Winekauf
Director, Operational Risk Management
Mutual of Omaha

Patrick Wright
Chief Information Security Officer
State of Nebraska

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Zirous

Zirous

Zirous
Zirous has provided IT solutions to our customers for 35+ years. Our ultimate goal is to improve customers' business processes by protecting and leveraging business data and pairing it with cutting edge technologies. Zirous has the foundational tools to increase efficiency, productivity and profitability and make a big impact on your business.
Visit Website

SILVER SPONSORS

Airgap

Airgap

Airgap
Airgap's Agentless Zero Trust Isolation™ platform is the best defense against ransomware propagation. Put an end to threat propagation and protect your infrastructure - in minutes, not months.
Visit Website
Arcserve

Arcserve

Arcserve
Arcserve is a global top 5 data protection vendor with best-in-class solutions that manage, protect, and recover all data workloads, from SMB to enterprise and regardless of location or complexity. A 100% channel-centric organization, Arcserve has a presence in over 150 countries, with 19,000 channel partners and 235,000 customers.
Visit Website
Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
Cybereason

Cybereason

Cybereason
Cybereason is the leader in endpoint protection, offering endpoint detection and response, next-generation antivirus, and managed monitoring services. Founded by elite intelligence professionals born and bred in offense-first hunting, Cybereason gives enterprises the upper hand over cyber adversaries.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
High Point Networks

High Point Networks

High Point Networks
High Point Networks is a leading provider of information technology solutions in both SMB and enterprise-level markets, servicing customers from coast to coast.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
Quest Software

Quest Software

Quest Software
At Quest, we solve complex problems with simple solutions. Our philosophy is focused on great products, great service and being simple to do business with. We deliver technology that eliminates the need to choose between efficiency and effectiveness.
Visit Website
SailPoint

SailPoint

SailPoint
SailPoint is the leading provider of identity security for the modern enterprise. Enterprise security starts and ends with identities and their access, yet the ability to manage and secure identities today has moved well beyond human capacity. Using a foundation of artificial intelligence and machine learning, the SailPoint Identity Security Platform delivers the right level of access to the right identities and resources at the right time— matching the scale, velocity, and environmental needs of today’s cloud-oriented enterprise. Our intelligent, autonomous, and integrated solutions put identity security at the core of digital business operations, enabling even the most complex organizations across the globe to build a security foundation capable of defending against today’s most pressing threats.
Visit Website
Tidelift

Tidelift

Tidelift
Tidelift provides a proactive approach to managing open source effectively for application development teams. The Tidelift Subscription can improve the health, security, and resilience of your organization’s open source software supply chain.
Visit Website

BRONZE SPONSORS

Cavern Technologies

Cavern Technologies

Cavern Technologies
Located outside of Kansas City, Cavern Technologies, Inc. is a leading provider in the development, leasing and operation of build-to-suit, wholesale data centers.
Visit Website
ExtraHop

ExtraHop

ExtraHop
ExtraHop delivers enterprise cyber analytics that allow you to quickly investigate threats, ensure the delivery of critical applications, and secure your investment in the cloud.
Visit Website
Qualys

Qualys

Qualys
Qualys, Inc. is a pioneer and leading provider of cloud-based security and compliance solutions with over 9,300 customers in more than 100 countries.
Visit Website

EXHIBITORS & ASSOCIATIONS

AITP Omaha

AITP Omaha

AITP Omaha
AITP is a professional assoc. of career minded individuals seeking to expand their potential. The organization seeks to provide avenues for members to be teachers as well as students and make contacts with other members in the Information Systems field.
Visit Website
ARMA Nebraska

ARMA Nebraska

ARMA Nebraska
ARMA Nebraska is a chapter of ARMA International, a not-for-profit professional association, and the authority on governing information as a strategic asset. Our goal is to be a valuable resource for information management professionals.
Visit Website
ISACA Omaha

ISACA Omaha

ISACA Omaha
Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the region.
Visit Website
ISC2 Omaha Lincoln

ISC2 Omaha Lincoln

ISC2 Omaha Lincoln
Our mission is to actively promote Security within the Community, network with peers and continue educational progression within the industry.
Visit Website
NEbraskaCERT

NEbraskaCERT

NEbraskaCERT
NEbraskaCERT provides repositories of technical information; links to and with other information sources; and assists in providing both academic courses and technical certifications in information security.
Visit Website
NETA

NETA

NETA
The Nebraska Educational Technology Association is a grassroots organization open to everyone interested in sharing information about using technology in the educational process. NETA has over 7,500 members.
Visit Website
Omaha 365

Omaha 365

Omaha 365
The Omaha SharePoint/Office 365 User Group meets monthly. We cover all aspects of SharePoint and Office 365. From basic user interactions, to management and development. We strive to have a full range of interesting topics that will appeal to our members.
Visit Website
VMUG Omaha

VMUG Omaha

VMUG Omaha
Officially launched in August of 2010, the VMware User Group (VMUG) is an independent, global, customer-led organization, created to maximize members’ use of VMware.
Visit Website

Interested in becoming part of our next Omaha event?

CONTACT US FOR INFO

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.