F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Omaha 2022 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Omaha EVENTS

AT A GLANCE

November 10th, 2022
8:30am – 4:30pm

CHI Health Center Omaha
Junior Ballroom
455 N. 10th Street
Omaha, NE 68102

Directions & Parking

Venue Accessibility

KEYNOTE: [1 CPE] Rethinking Your Data Strategy with Zero Trust Privacy

  Presented by Dr. Lisa McKee Ph.D., CISA, CDPSE, CRISC • Director of Governance, Risk, Compliance, and Privacy, Hudl

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Theater Three
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Securing Layer 8

  Presented by Synack

One of the most difficult challenges globally is securing the human element and as such, it tends to be neglected. The current solution of training with “gotcha” emails is not successful and tends to cause unintended negative consequences. We will investigate a more global approach to securing businesses by taking on the “business of hacking.” We’ll show how we can harden the human element and expand our footprint by using a better way to learn and widening our defenses. The key is to ensure we also harden society to help drive the ROI for attackers up enough that business is no longer profitable, forcing them into the technology fight in which, as an industry, security professionals have much more secure footing.

Topics: Information Security, Infrastructure, Strategic Management
10:00 - 10:50 PM

[1 CPE] Secure Device Onboarding with Cloudpath

  Presented by Pine Cove & Ruckus

Cloudpath provisions digital certificates to your users’ devices, providing the highest level of wireless security. You gain visibility and control over which devices are on the network and can define and manage policies so every user sees only the network resources they should see. Company-issued devices can be automatically connected to the network, and Cloudpath also provides an intuitive self-service portal for BYOD. It associates every device with a user, and you can easily revoke access at any time—for example, when a BYOD user leaves the organization. The service supports any Wi-Fi enabled device, including headless and IoT devices. Cloudpath supports all major wireless vendors, and white glove service is available for a turn-key solution.

11:00 - 11:50 AM

[1 CPE] Navigating Today’s Threat Landscape: A Current State of Cybersecurity

  Presented by Fortinet

Join Fortinet for comprehensive look at the current state of cybersecurity. Today’s ever-evolving threat landscape requires an integrated, automated approach to security. Learn how you can mitigate risk in your organization, optimize your security team’s operations, and gain best practices to integrate and consolidate your security tools; whether you’ve taken a multi-vendor or single-vendor approach.

After leaving our session, you will understand:

  • More about the current state of cybersecurity and how it relates to your business
  • How to scale company growth while securing against constantly evolving threat vectors
  • How your security tools should ideally be integrating with each other and automating security functions
  • Best practices to optimize security
  • How to consolidate security controls to improve your security posture
Topics: Information Security
12:00 - 12:50 PM

[1 CPE] Scaling Network Infrastructure: From the Remote Employee to The Corporate Office

  Presented by Pine Cove Consulting

In the world we live in, employees are now working from home. However, that does not mean they do not need adequate network infrastructure, so their workday runs smoothly. During this presentation, we will talk about how to implement network devices like servers, on a very small scale like a home office, and how networking technology changes when scaling up to fit a larger space and more employees, like the corporate office.

Topics: Infrastructure
1:00 - 1:50 PM

[1 CPE] Open-Source Developers Are Security’s New Front Line

  Presented by Sonatype

Bad actors have recognized the power of open source and are now beginning to create their own attack opportunities. This new form of assault, where OSS project credentials are compromised and malicious code is intentionally injected into open-source libraries, allows hackers to poison the well. In this session, Sonatype will explain how both security and developers must work together to stop this trend or risk losing the entire open-source ecosystem.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Shifting Your Workforce Strategy to Support Your Growing Organization

  Presented by IP Pathways

The technology landscape continues to evolve. Finding cloud talent to architect & build a custom solution continues to be challenging and even harder to retain. Lead times for hardware continue to increase making it hard to support growing businesses. During this session, we will outline the trends being used to supplement your workforce strategy.

Topics: Strategic Management
Dr. Lisa McKee Ph.D., CISA, CDPSE, CRISCDr. Lisa McKee Ph.D., CISA, CDPSE, CRISCDirector of Governance, Risk, Compliance, and Privacy, Hudl
3:00 - 3:50 PM

[1 CPE] Rethinking Your Data Strategy with Zero Trust Privacy

  Presented by Dr. Lisa McKee Ph.D., CISA, CDPSE, CRISC • Director of Governance, Risk, Compliance, and Privacy, Hudl

At the foundation of Zero Trust Privacy, should be data – and for good reason! Organizations that have visibility into their data and the activities around it are better equipped to implement a successful privacy program using the principles of zero trust. Many believe identity is the core principle of zero trust, but how does one implement effective access controls without knowing the data they are granting permissions to? Zero Trust Privacy supports privacy compliance while enabling the implementation of proper access controls to detect suspicious behavior, even when other security controls have been compromised.

The key points covered in this presentation will be as follows:

  • Understand what Zero Trust Privacy is and why data should be the foundation of any security and privacy program.
  • Identify methods for coordination and collaboration between privacy and security within a Zero Trust strategy.
  • Execute techniques for implementing and overcoming challenges of integrating Zero Trust Privacy.
  • Initiate discussions with organizational stakeholders on steps for creating a Zero Trust Privacy strategy for their organization.

Lisa McKee Ph.D., CISA, CDPSE, CRISC, has 20 years of industry experience in Cybersecurity, Privacy, Information Technology, Vendor Management, Software Development, IT Audit, Compliance, PCI, and GRC. McKee assists companies in conducting security and privacy assessments, program implementation, and managing compliance. She is a highly regarded privacy expert and a regularly featured speaker at conferences and events locally, nationally, and globally for IAPP, ISACA, IIA, ISC2, NEbraskaCERT, and RSAC. McKee is a member of the Accredited Standards Committee X9 providing input on industry standards. She is a member of several professional association boards and an adjunct instructor for security and privacy courses. She is passionate about privacy and security.

Topics: Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] Automate or Die: DevSecOps in the Age of Software Supply Chain Attacks

  Presented by Sonatype

As nimble organizations deliver new innovations, adversaries are also upping their game; something we’ve seen in recent high-profile and devastating cyber-attacks. Bad actors have the intent and ability to exploit security vulnerabilities in the software supply chain - and in some cases plant vulnerabilities themselves. They have increased scale through automation and improved breach success through precision targeting. If we don’t fight back by doing the same - automating security directly in the DevOps pipeline - then we’ll always be at the hackers’ mercy. This session will provide new research on the above and details on how to get started.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Challenge the Threat of Ransomware: Best Practices to Prepare, Mitigate, and Recover

  Presented by Zerto

Ransomware attacks continue to rise in volume, severity, and costs to businesses attacked while cyber criminals continue inventing new and unexpected methods to spread malware and encrypt critical data. As attacks continue to specialize, no organization is immune to ransomware. So how do you avoid being forced to pay a ransom, disruptions to services and supply chains, and damage to your brand in the news? Join recovery and data protection experts from Zerto to discuss best practices for when – not if – ransomware strikes. Be prepared to minimize downtime, data loss, and mitigate the risks of ransomware. In this session, you’ll learn:

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] The Future of Observability

  Presented by Cribl

Digital transformations, cloud migrations, and persistent security threats turned observability from a niche concern to an essential capability in today’s organizations. We’re still in the early days of observability maturity, but early stumbles point to where observability must go in the future. This talk discusses where observability is today and the three critical areas necessary for observability to deliver on its promises throughout the enterprise.

Topics: Information Security, Infrastructure
1:00 - 1:50 PM

[1 CPE] Digital Transformation is Built on a Foundation of APIs – But are Your APIs Secure?

  Presented by 42Crunch

APIs are the core building block of every enterprise’s digital strategy, yet they are also the number one attack surface for hackers. Traditional security and management approaches are failing every day as the scale and reach of API attacks increase. The time is now right for enterprises to consider a new end-to-end continuous approach to protecting their APIs. In this talk, you will learn how Global 2500 enterprises are embracing a positive security model combining shift-left and shield-right methodologies to protect their APIs throughout the API lifecycle.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] How to Keep Your Business Flowing

  Presented by Check Point

As businesses rely more on email and collaboration tools to run their operations, cyber-criminals are finding new ways to compromise remote workforces. Join this session for a discussion of Social Engineering, how it works, and the different threat vectors that affect business users and their tools today. We’ll cover what a business should have in place to protect users and provide a quick focus on Harmony and how it can help address these concerns.

  • Sessions
9:00 - 9:50 AM

[1 CPE] Top 10 Myths and Misconceptions About Ransomware

  Presented by Bitdefender

2021 was “the year of ransomware.” But so were 2017, 2018, 2019, and 2020 – and so far, 2022 is not very different. Ransomware is no longer a problem discussed only in the cybersecurity and tech communities – it is now a regular topic in mainstream media headlines and executive board meetings.

So why is ransomware such a menace, and why can we not seem to get rid of it? One of the reasons is that we seem to miss the continued evolution of ransomware. We keep preparing for the last war. Ransomware in 2022 is very different than ransomware in 2017, yet we still treat it the same way.

Roy Correa, Enterprise Field Engineer will help you to learn more about:

  • Ransomware evolution and what we need to un-learn to effectively combat it
  • The most common myths, misunderstandings, and misconceptions about ransomware and the threat actors behind it
  • The most effective tips to become more cyber resilient and prevent security incidents from turning into catastrophic breaches
Topics: Information Security
10:00 - 10:50 AM

[1 CPE] How AI Can Think Like an Attacker

  Presented by Darktrace

In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen and to recover if compromised. In this session, we’ll unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Immutable Storage: Level-Up Ransomware Readiness

  Presented by Arcserve

Data is expected to grow to 200 ZB by the end of 2025. More data to manage, more data to protect. IDC recommends a 3-2-1-1 best practice as a mid-market data protection strategy. The addition of the new "1" is a copy of the data on immutable storage. Backup data is a key tool in business continuity & disaster recovery planning. Securing this backup data and maintaining multiple copies of it allow for a resilient recovery plan. Your cyber security plan is incomplete without a reliable recovery plan. In the event of any disaster, natural or man-made, like a ransomware attack, getting your IT systems and workloads back on their feet as fast as possible is essential. Join us as we share best practices to help keep your data protected and secure with multiple layers of defenses. We will share our perspective on how organizations can simplify the approach of incorporating guidance from NIST’s Cybersecurity Framework into their own environments.

Presented by Steve Kleis, Principle Sales Engineer

Over the past 20 years, I've been fortunate to know many business owners and be part of their IT management strategy. As a trusted advisor I worked to understand their business needs and design solutions that were fast and reliable. I have extensive experience with data backup, disaster recovery (DRaaS), business continuity, cloud storage, ransomware, and Network Attached Storage (NAS).

Currently, I am a sales engineer for Arcserve/Storagecraft supporting the North Central territory. As a member of a sales team, we work to help our customers protect what’s priceless, their data.

Topics: Business Continuity / Disaster Recovery
1:00 - 1:50 PM

[1 CPE] Analyzing Data Sources for Maximum Visibility

  Presented by Red Canary

Learn how you can prioritize the collection of ATT&CK data sources, use this information to inform technology selection, and ultimately build a strong foundation for your detection engineering program.

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

PJ Biodrowski
Manager, Information Security & IT Operations
Sarpy County, NE

Jon Brantner
Director, Information Technology
Earl May Seed & Nursery

Krista Freimuth
IS Asset Manager
Mutual of Omaha Insurance Co.

Jay Gnuse
Director, Information Technology
Chief Industries

Kevin Hamilton
Vice President, Global Cyber Security
Fiserv

Rick Haugerud
AVP, Information Technology Services
University of Nebraska

Andy Hinton
Manager, IT Audit
CSG International

Matt Johnson
Sr Vice President
PremierBank

Rob LaMagna-Reiter
Chief information Security Officer
Hudl

Eric Matulka
Vice President, Information Technology
DEI Communities

Lisa McKee
Director, Governance Risk Compliance & Privacy
Hudl

Andrew Munger
Vice Chairman & COO
Verterent

Jim Navin
Chief information Officer
Gavilon Group, LLC

David Newell
Manager, Controls & Governance
Bank of the West

Jinson Pappalil
Director, Information Technology
Metropolitan Utilities District

Amber Roberts
Sr IT Support Analyst
Gavilon Group, LLC

Chasity Seymour
VP / Manager, Cybersecurity Governance
Bank of the West

Ron Strawn
Manager, Information Technology
Vanguard Research Inc

Ed Toner
Chief Information Officer
State of Nebraska

Mike Welna
Sr Information Security Officer
Boys Town

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Pine Cove Consulting

Pine Cove Consulting

Pine Cove Consulting
Pine Cove Consulting has serviced educational institutions, government agencies, and businesses across the Rocky Mountain Region since 1993. Pine Cove is a Sophos Platinum Partner and offers a suite of cybersecurity products to protect your organization.
Visit Website
Sonatype

Sonatype

Sonatype
Sonatype is the developer-friendly full-spectrum software supply chain management platform that helps organizations and software developers.
Visit Website

SILVER SPONSORS

42Crunch

42Crunch

42Crunch
42Crunch is an API Security platform, addressing the development, testing, and deployment security requirements of API infrastructure.
Visit Website
Arcserve

Arcserve

Arcserve
Arcserve is a global top 5 data protection vendor with best-in-class solutions that manage, protect, and recover all data workloads, from SMB to enterprise and regardless of location or complexity. A 100% channel-centric organization, Arcserve has a presence in over 150 countries, with 19,000 channel partners and 235,000 customers.
Visit Website
Bitdefender

Bitdefender

Bitdefender
Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide. Guardian over millions of consumer, business, and government environments, we are the industry’s trusted expert for eliminating threats, protecting privacy and data, and enabling cyber resiliency.
Visit Website
Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
Cribl

Cribl

Cribl
Founded with a vision of simplifying big data and log analytics at scale, Cribl is innovating the real-time data pipeline. Led by a team of experts in IT Operations and Observability, Cribl provides users a new level of visibility, intelligence, and control over their data.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface & the power to take on the ever-increasing performance requirements of the borderless network – today and into the future.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
IP Pathways

IP Pathways

IP Pathways
IP Pathways delivers a consultant-led experience to overcome all IT challenges your organization faces today. Our best-in-class engineers first listen to your goals then architect, implement, monitor, support, and manage custom technology solutions to help you reach them. Whether in the cloud or on-premise, we strive to understand your business and become a true strategic technology partner.
Visit Website
Red Canary

Red Canary

Red Canary
The Red Canary Security Operations Platform, driven by purpose-built technology, security research, and threat intelligence, provides advanced threat detection and response across your entire IT estate to improve your security outcomes.
Visit Website
Synack

Synack

Synack
Synack’s premier on-demand security testing platform harnesses a talented, vetted community of security researchers and smart technology to deliver continuous penetration testing and vulnerability management, with actionable results. We are committed to making the world more secure by closing the cybersecurity skills gap, giving organizations on-demand access to the most-trusted security researchers in the world.
Visit Website
ValorC3

ValorC3

ValorC3
ValorC3 is a modern data center, cloud and connectivity partner that delivers agile, scalable IT solutions tailored to the relentless mid-market enterprise. Valor meets clients where they’re at and gets them where they need to grow, helping them navigate the rapidly changing digital landscape with flexible, high-density data centers, extensive infrastructure expansion capabilities, low latency networks, strong partnerships and decades of industry expertise.
Visit Website

BRONZE SPONSORS

Alchemy Technology Group

Alchemy Technology Group

Alchemy Technology Group
We at Alchemy understand that the balance of supporting your needs in a secure and cost-effective manner is paramount. Our goal is to understand your business and present meaningful solutions to be a truly transformative partner.
Visit Website
Cox Business

Cox Business

Cox Business
Cox Business is a strategic communications company that focuses on delivering secure, next-gen technologies and platforms that enable customers to succeed.
Visit Website
Hitachi Vantara

Hitachi Vantara

Hitachi Vantara
Hitachi Vantara helps enterprises create and derive value from their data. Its solutions include best-in-class data management, IT infrastructure and analytics products, IoT solutions and Smart Spaces technologies for a broad range of industries.
Visit Website
Tenfold Security

Tenfold Security

Tenfold Security
Tenfold Security provides a Secure Cloud as a Service platform that includes Secure Infrastructure Build with continuous assessment, monitoring, and hardening as well as The Zeus Cloud Builder which is a graphical Cloud Builder. Zeus supports multiple cloud provider platforms and is so easy, a junior-level technician can architect, build, deploy, and support multiple cloud instances with security built in, and without programming experience.
Visit Website

EXHIBITORS & ASSOCIATIONS

AITP Omaha

AITP Omaha

AITP Omaha
AITP is a professional assoc. of career minded individuals seeking to expand their potential. The organization seeks to provide avenues for members to be teachers as well as students and make contacts with other members in the Information Systems field.
Visit Website
ARMA Nebraska

ARMA Nebraska

ARMA Nebraska
ARMA Nebraska is a chapter of ARMA International, a not-for-profit professional association, and the authority on governing information as a strategic asset. Our goal is to be a valuable resource for information management professionals.
Visit Website
BeyondTrust

BeyondTrust

BeyondTrust
BeyondTrust provides context-aware Privileged Account Management and Vulnerability Management software solutions that deliver the visibility necessary to reduce IT security risks and simplify compliance reporting.
Visit Website
High Point Networks

High Point Networks

High Point Networks
High Point Networks is a leading provider of information technology solutions in both SMB and enterprise-level markets, servicing customers from coast to coast.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
ISACA Omaha

ISACA Omaha

ISACA Omaha
Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the region.
Visit Website
NEbraskaCERT

NEbraskaCERT

NEbraskaCERT
NEbraskaCERT provides repositories of technical information; links to and with other information sources; and assists in providing both academic courses and technical certifications in information security.
Visit Website
Okta

Okta

Okta
Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology— anywhere, on any device or app. Organizations trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, government, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations.
Visit Website
Omaha 365

Omaha 365

Omaha 365
The Omaha SharePoint/Office 365 User Group meets monthly. We cover all aspects of SharePoint and Office 365. From basic user interactions, to management and development. We strive to have a full range of interesting topics that will appeal to our members.
Visit Website
Ruckus Networks

Ruckus Networks

Ruckus Networks
Ruckus Networks is redefining connectivity around the globe. We build secure wired and wireless access networks for organizations that place a premium on connectivity experiences for end-users as well as simplicity and lower-cost-per-connection for IT.
Visit Website
VMUG Omaha

VMUG Omaha

VMUG Omaha
Officially launched in August of 2010, the VMware User Group (VMUG) is an independent, global, customer-led organization, created to maximize members’ use of VMware.
Visit Website

Interested in becoming part of our next Omaha event?

CONTACT US FOR INFO

Omaha

CHI Health Center Omaha
Junior Ballroom
455 N. 10th Street
Omaha, NE 68102

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.