F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Portland 2019 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

March 26th, 2019
8:30am – 4:30pm

Oregon Convention Center
Portland Ballroom
777 NE Martin Luther King, Jr. Blvd.
Portland, OR 97232

Directions & Parking

KEYNOTE: On a Clear Day You Can See the Cloud

  Presented by Ben Berry • Executive VP, Information Technology & CIO of Bonneville Power Administration

Seminar Schedule

VIEW FLOORPLAN
  • Theater One
  • Theater Two
  • Theater Three
  • Theater Four
  • Check Point Mini Theater
  • Solutions Showcase Mini Theater
  • AM Sessions
  • PM Sessions
  • Keynote
9:00 - 9:50 AM

Welcome to the New Age of Converged Secondary and Primary Storage

  Presented by StorageCraft

Managing storage continues to be complex, and often expensive. Something needs to change, and it certainly won't be a dramatic increase in staffing. Fortunately, object storage is the answer. By eliminating the use of legacy RAID, object storage, can be the foundation for a scale-out converged storage solution that solves both data protection and primary storage challenges. Want to recover a multi-TB VM in less than a second? No problem. Want to protect files from ransomware? No problem. Need an enterprise file serving, archiving, or virtual server storage solution? No Problem. Attend this session to learn how object storage is changing the landscape for IT admin and the technology of the future.

Topics: Data Storage
10:00 - 10:50 AM

Mitigating Cybercrime Through Automated Response and Integration

  Presented by Fortinet

Come join our talk on mitigating cybercrime and learn about best practices to help your company maintain a strong security posture through the digital transformation and beyond. The bad guys are using automated tactics to try to find a foothold in your network. Isn't it time to leverage an integrated security approach to automate your response?

Topics: Information Security, Infrastructure
11:00 - 11:50 AM

Backups to the Cloud: Our Journey to Move Beyond Tape

  Presented by Commvault

Learn how Portland State University ditched tape and took advantage of cloud storage to improve the geographical diversity of offsite backups as well as enhance recovery capabilities. Replacing tape backups and offsite storage with public cloud within the existing budget can be a daunting challenge. The presenters provide an overview of Portland State University's backup methodologies, technical challenges, security concerns, and budget strategies to prepare each organization for what is required when transitioning from tape to cloud.

Topics: Business Continuity / Disaster Recovery, Data Center Technology
12:00 - 12:45 PM

Phishing, Shoulder Surfing, Drafting: Avoiding Social Engineering Exploits

  Moderated by INTERFACE Advisory Council

Social engineering has been around longer than we've had computers and continues to represent a significant risk to companies in the US and around the world. Whether it's a phishing attack, opening a malicious attachment, seeing a stranger show up where he or she shouldn't be or logging on to the company network from a coffee shop it all comes down to people. It's important to make use of training and other tools to reduce the risk of such attacks. Many security incidents and breaches that occur are not the result of not rolling out the right software or installing strong locks on the doors. They result from well-meaning people who just aren't paying attention to social engineering risks. This session provides participants with tools they can use in their companies to protect confidential and non-public data as technologies and training that will, if understood and used properly, reduce risks significantly.

Moderator:

  • Chris Apgar • CEO & President, Apgar and Associates

Panelists:

  • Erik Gellatly • President; InfraGard Oregon Members' Alliance
  • Theresa Masse • CISO; Port of Portland
  • Christopher Paidhrin • CISO, City of Portland
  • Dennis Tomlin • CISO, Multnomah County
1:00 - 1:50 PM

Cloud Security: Top Use Cases for Modern Cloud Protection

  Presented by Xiologix

With enterprises embracing multiple cloud environments, the attack surface is growing immensely—but security visibility and coordination are shrinking. In this presentation, we will discuss why and how to bring the cloud conversation into hardware purchase conversations and who is responsible for securing the different types of cloud resources. We will also walk through the six most common use cases for cloud protection.

Topics: Information Security
2:00 - 2:50 PM

PCI and Your Organizational Liability

  Presented by Structured Communication Systems

Payment card processing is a critical service many companies and organizations offer. But with this service comes the added responsibility to comply with PCI requirements, and the technical, administrative, and physical controls applicable to card processing environments. Failure to comply can result in costly fines. Plus, a breach of card holder information could have disastrous financial and public relations consequences for compromised merchants. Want to know more? With compelling and engaging content delivered by Rob Wayt, a PCI Qualified Security Assessor (QSA), you will learn the intricacies of these requirements, proper scoping, and how to mitigate risks that merchants have while card processing.

Topics: Information Security
Executive VP, Information Technology & CIO of Bonneville Power Administration
3:00 - 3:50 PM

On a Clear Day You Can See the Cloud

  Presented by Ben Berry • Executive VP, Information Technology & CIO of Bonneville Power Administration

Deciding whether and how to use cloud computing versus on premise is a complex decision. It can be complicated by business architecture, vendor software development strategies, multicloud approaches, compliance requirements, who owns the data, and the color of money. As Executive VP for Information Technology and CIO for Bonneville Power Administration, Ben Berry works with IT Strategic Business Partners and customers to make the right cloud decisions.

Serving as a strategic technology leader, Ben Berry is a professional with performance-based leadership and knowledge of diverse private and public sector business and technology systems. He is the Executive Vice President of Information Technology and CIO for the Federal Government's Bonneville Power Administration. The power generated on BPA's electric grid is sold to public utilities, private utilities, and industry on the grid.

Mr. Berry is the Aerospace Entrepreneurial CEO and Chief Digital Officer for AirShip Technologies Group's AirShip Endurance Unmanned Aerial Vehicles, StingerMAV MicroIntelligence for clean tech, long flight endurance drones. He has held various senior leadership technology positions serving the Royal Saudi Air Force, Kingdom of Saudi Arabian International Airports, and Hughes Aircraft Company–Los Angeles. He is a Board of Director at the Evergreen Aviation and Space Museum. Currently he serves as a U.S. Air Force Honorary Commander for the U.S. Air Force 142nd Fighter Wing, one of two "Ready Alert Bases" that protect the entire West Coast of the United States of America and Canada as part of NORAD.

Mr. Berry is the previous Chief Technology Officer for the City of Portland. Previously, He also served as Oregon Department of Transportation's (ODOT) Chief Information Officer providing overall leadership, planning, development and delivery of information technology services for ODOT and several other non-transportation organizations. As CIO for the second largest state agency in Oregon, Mr. Berry was responsible for systems supporting highways, bridges, rail service, right-of-way determinations, DMV and Motor Carrier commercial trucking inspections and licensing throughout the state.

Mr. Berry is the former Regional Chief Technology Officer of Providence Health System Oregon, supporting a service area of eight hospitals and 33 clinics. He has held executive and management positions in sectors such as state and local government, healthcare, telecommunications, aerospace/defense and airport transportation. Berry received his M.B.A. from UCLA, a B.S. in Life Science--Biotechnology from the University of Portland.

Mr. Berry currently serves on the following Boards:

  • Central City Concern (8yrs.)
  • Oregon State University, School of Business–Business Information Systems (12yrs.)
  • Evergreen Aviation and Space Museum (4yrs.)
  • Scouts, BSA – Pacific Cascade Council Board (3yrs.)
  • iUrban Teen Technology (7yrs.)
  • AM Sessions
  • PM Sessions
9:00 - 9:50 AM

Modernize Your Business with Cloud-Ready Infrastructure

  Presented by Xiologix

Today's IT infrastructure must manage our modern hyper-connected, and hyper-distributed digital realities. In this presentation, we will discuss the important relationship between on-premises hardware and cloud services, reality vs expectations when executing a new cloud strategy, and how to minimize cost while running in the cloud.

Topics: Infrastructure
10:00 - 10:50 AM

Rearchitecting Security for Branch and Mobile Users

  Presented by Palo Alto Networks

Traditional back haul hub & spoke networking, such as MPLS and remote access VPN, is not suitable for today's mix of cloud and internet applications. Join our session to learn what is needed for consistent security that provides the coverage for growing organization.

Topics: Infrastructure
11:00 - 11:50 AM

Predict Future Attacks with AI

  Presented by Cylance & Structured Communication Systems

Get a first-hand look at how cybercrime is conducted today, how to combat the most damaging attack strategies, and how to even prevent threats that have not been seen before. Take a journey with us as we explore the enemy, revealing tactics and tricks, so you don't become the next cybercrime victim. Join us in the good fight against an ever-changing threat vector with the best weapons, knowledge, and powerful AI-based technology. /p>

Topics: Information Security
12:00 - 12:45 PM

IT Modernization

  Moderated by INTERFACE Advisory Council

IT Modernization means different things to different organizations and their IT departments. Generally it is the process of upgrading the technical infrastructure, be it the hardware for the network, the servers or desktops, and increasingly the mobile devices in play. It is also the process of upgrading the business applications by upgrading and/or replacing the vendor supported application, or the AppDev stack for in house systems.

IT Modernization is often challenged by the business priorities, and the need to deliver new functionality to remain competitive or increase efficiency and customer service. Deferring and avoiding the updating and modernization in IT leads down the dark path of technical debt and bankruptcy.

Join a panel of senior IT managers to discuss how their IT organizations have led IT modernization efforts, and share pointers and best practices in this area.

Moderator:

  • Richard Appleyard • Deputy CIO for Oregon Secretary of State

Panelists:

  • Caesar Bernardo • IT Program Manager / Consultant
  • Stephen Fitton • Technical Solutions Manager at Salem Health
1:00 - 1:50 PM

Welcome to the New Age of Converged Secondary and Primary Storage

  Presented by StorageCraft

Managing storage continues to be complex, and often expensive. Something needs to change, and it certainly won't be a dramatic increase in staffing. Fortunately, object storage is the answer. By eliminating the use of legacy RAID, object storage, can be the foundation for a scale-out converged storage solution that solves both data protection and primary storage challenges. Want to recover a multi-TB VM in less than a second? No problem. Want to protect files from ransomware? No problem. Need an enterprise file serving, archiving, or virtual server storage solution? No Problem. Attend this session to learn how object storage is changing the landscape for IT admin and the technology of the future.

Topics: Data Storage
2:00 - 2:50 PM

Micro-Segmentation 101

  Presented by Illumio

Companies of all sizes are struggling to ensure their networks are secure using aging firewall security systems. Micro-segmentation, when implemented correctly, can offer the additional security they need and provide tremendous application visibility in the process.

You'll learn...

  • Why you need micro-segmentation
  • How micro-segmentation works
  • The 5 steps to implementing a micro-segmentation strategy for your data center and cloud
Topics: Information Security
  • AM Sessions
  • PM Sessions
9:00 - 9:50 AM

Active Directory Security: Early Stage Attack Activities to Watch For

  Presented by STEALTHbits Technologies

Attackers have demonstrated a consistent and ongoing ability to obtain access to workstations inside the network boundary through phishing and other web and email attacks. From here, attackers set their sights on gaining control of Active Directory as a means to an end; compromising Active Directory is an easy way to gain access to all critical corporate data and resources. Darin will discuss two early stage attack activities: LDAP reconnaissance and Password Spraying — that allow attackers to move laterally inside your AD environment. Detection strategies and mitigation steps will also be explained.

Topics: Infrastructure
10:00 - 10:50 AM

Architecting the New SD-WAN Edge for the Cloud-first Enterprise

  Presented by Silver Peak Systems

Adoption of cloud services has driven enterprises to re-think WAN architecture. Architectures based on traditional, manually-programmed routers can't keep pace. A business-driven SD-WAN can provide secure direct connections from the branch to SaaS/IaaS across the internet, significantly increasing application performance resulting in a superior end-user QoEx (Quality of Experience). By integrating SD-WAN, WAN optimization, routing and security in a single unified platform, enterprises can simplify branch WAN edge architecture, accelerating time to value and dramatically reducing operational costs. From a centralized SD-WAN orchestrator, application priorities and QoS and security policies may be configured and assigned to automate traffic handling across the WAN. A single mouse click distributes SD-WAN configuration parameters to all sites, improving operational efficiency and minimizing the potential for human errors that can negatively impact application availability and enterprise security. This session will describe why SD-WAN adoption continues at a breakneck pace because of the user productivity, agility and cost savings benefits that a business-driven SD-WAN delivers.

Topics: Information Security
11:00 - 11:50 AM

The Current Malware Threat Landscape & Best Practices for Remediation

  Presented by Malwarebytes

Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.

This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.

Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.

Topics: Information Security
12:00 - 12:45 PM

Building the SNOC: How to Integrate SecOps and NetOps

  Presented by ExtraHop

As the IT environment becomes more complex and distributed, it is more important than ever that Security Operations and Network Operations teams work together. This presentation explains the opportunities for optimizing budgets, cross-training staff, accelerating threat response, and improving end-user experience that come with integrated security and network operations. Attendees will also learn practical steps they can take toward building an integrated Security and Network Operations Center (SNOC).

Topics: Information Security
1:00 - 1:50 PM

A New Era for Data Protection: Converged DR and Backup

  Presented by Zerto

In today's always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. Being prepared for any data related disaster is key!

  • The cost and business impact of downtime and data loss can be immense
  • Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by software problems and cyber security related disasters
  • Having a plan and process in place will help you mitigate the impact of an outage on your business

In this presentation we will address the challenges, needs, strategies, and solutions.

Topics: Business Continuity / Disaster Recovery
2:00 - 2:50 PM

Virtualizing Production Databases: SQL Server

  Presented by IVOXY Consulting

How do you know if your SQL Server VM's are as fast as they could be? When a SQL VM is "slow", is it the database or the way the VM is built? What should we do differently when we build a virtual SQL server? If you've asked – or been asked – questions like these, allow us to share our 12 years' experience in designing virtual infrastructure for mission-critical applications & databases.

Presentation topics include:

  • What makes a virtual database server different than a physical one
  • Properly sizing a SQL VM: Bigger is not better
  • Tuning a VM for transactional performance
  • Configuring storage queues
  • The metrics that matter, what they mean & how to spot bottlenecks
  • How to leverage virtualization for a better backup & DR strategy
Topics: Data Center Technology, Data Storage
  • AM Sessions
  • PM Sessions
9:00 - 9:50 AM

The Monsters We Build: Apps from Pieces and Parts

  Presented by F5 Networks

The way we build applications today differs greatly from how they were built just a few years ago. The rise of architectural approaches to development like microservices, function-as-a-service, and injectable components have simplified some aspects of application development but has made our applications into lumbering Frankenstein's monsters in other ways. Learn how to properly map out your monster's anatomy and identify hidden, critical weaknesses in delivery, security, and operability…before they come after you with torches.

Topics: Information Security
10:00 - 10:50 AM

Choosing the Right Cloud Environment: Public, Private, or Hybrid

  Presented by Atmosera

In pursuit of enhanced connectivity, scalability, and efficiency, cloud migration is hastening across all industry sectors. In order to unlock the cloud's benefits, these environments—public, private, and hybrid–must be explicitly architected and engineered to suit the respective applications they will host, while also meeting security and compliance requirements. How do businesses determine their ideal cloud environment and optimize it post-migration?

In this presentation, we will review and compare:

  • The physical and virtual components of public, private, and hybrid cloud environments
  • The business considerations that differentiate each environment, including storage space, workloads, compliance, internal staff, and other business requirements
  • The relationship between organizations, cloud providers, and MSPs
  • The best practices organizations should consider keeping their cloud environment secure, compliant, and optimized post-migration
Topics: Data Center Technology
11:00 - 11:50 AM

Shifting from ITSM to ESM as a Way to Enable and Transform the Enterprise

  Presented by ServiceNow

As a member of IT, have you found yourself doubting your relationship with the rest of the organization as you're perceived as a cost center rather an equal part stakeholder with a common goal? Do you find yourself struggling to collaborate with the rest of the organization as the tech debt in your organization has created seemingly insurmountable silo's? If you feel any of this describes your work environment and how IT may be perceived, please join the discussion in how the concepts of IT Service Management need to shift to a more inclusive Enterprise Service Management strategy. Ultimately, driving more effective technology purchasing, collaboration across the enterprise and re-branding of IT as an organizational enabler.

Topics: Culture
12:00 - 12:45 PM

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today's businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Topics: Artificial Intelligence, Information Security
1:00 - 1:50 PM

Developing a 360 Data Management Strategy for Your Business

  Presented by World Wide Technology & Veritas

Exponential data growth, rising storage costs, complex cloud migrations, and stringent regulations are forcing organizations to find efficient and economical ways to take control of and manage their growing data environment.

Join this session to learn how a global financial institution and a large data analytics company were both able to successfully implement an end-to-end data management strategy, which encompassed the following:

  • Data Protection: ensure data copies are kept for redundancy to prevent data loss.
  • Compliance Readiness: proper retention and timely destruction of data as regulatory requirements dictate.
  • Data Visibility: understanding what data you have, where it is, and how it's used.
  • Data/Workload Portability: movement and migration of applications and data among various on-prem and cloud locations.
  • Business Continuity: recovery and resilience that is needed when massive outages or disasters occur.
  • Storage Optimization: automating the storage of data across resources to optimize cost and performance.
Topics: Business Continuity / Disaster Recovery
2:00 - 2:50 PM

Erasure Coding and Object Storage

  Presented by Dasher Technologies

Overview of Erasure Coding, including its early adoption within Object Storage and how it is used in the modern datacenter. We will also include future projections.

Topics: Data Storage
  • AM Sessions
  • PM Sessions
9:00 - 9:50 AM

My CEO Told Me We Have to Move Our Datacenter to the Public Cloud…So What?

  Presented by Check Point Software

The objective to validate the challenges and threats for datacenter migration and best practices to secure application on the public cloud.

Overcoming public cloud challenges:

  • Shared responsibility is unclear
  • Lateral spread of threats
  • Account hijacking
  • Inconsistent tools for visibility, management and reporting
  • Increasingly sophisticated and automated attacks
10:00 - 10:50 AM

My CEO Told Me We Have to Move Our Datacenter to the Public Cloud…So What?

  Presented by Check Point Software

The objective to validate the challenges and threats for datacenter migration and best practices to secure application on the public cloud.

Overcoming public cloud challenges:

  • Shared responsibility is unclear
  • Lateral spread of threats
  • Account hijacking
  • Inconsistent tools for visibility, management and reporting
  • Increasingly sophisticated and automated attacks
11:00 - 11:50 AM

My CEO Told Me We Have to Move Our Datacenter to the Public Cloud…So What?

  Presented by Check Point Software

The objective to validate the challenges and threats for datacenter migration and best practices to secure application on the public cloud.

Overcoming public cloud challenges:

  • Shared responsibility is unclear
  • Lateral spread of threats
  • Account hijacking
  • Inconsistent tools for visibility, management and reporting
  • Increasingly sophisticated and automated attacks
1:00 - 1:50 PM

My CEO Told Me We Have to Move Our Datacenter to the Public Cloud…So What?

  Presented by Check Point Software

The objective to validate the challenges and threats for datacenter migration and best practices to secure application on the public cloud.

Overcoming public cloud challenges:

  • Shared responsibility is unclear
  • Lateral spread of threats
  • Account hijacking
  • Inconsistent tools for visibility, management and reporting
  • Increasingly sophisticated and automated attacks
2:00 - 2:50 PM

My CEO Told Me We Have to Move Our Datacenter to the Public Cloud…So What?

  Presented by Check Point Software

The objective to validate the challenges and threats for datacenter migration and best practices to secure application on the public cloud.

Overcoming public cloud challenges:

  • Shared responsibility is unclear
  • Lateral spread of threats
  • Account hijacking
  • Inconsistent tools for visibility, management and reporting
  • Increasingly sophisticated and automated attacks
  • AM Sessions
  • PM Sessions
10:00 - 10:50 AM

How to Build a SOC with Limited Resources

  Presented by LogRhythm

In a perfect world, your organization would staff a 24x7 Security Operation Center, and have no trouble finding the budget or talent to do so. But the truth is, most organizations can't afford a 24x7 SOC. The cost of having well-trained analysts onsite at all times outweighs the benefits.

If your organization is making do with an informal Security Operation Center, you may be facing delays in responding to incidents. You may even fear that incidents are going unnoticed. It's a dangerous situation.

Organizations need to think of security operations as a critical business process. Effective security operations are the first line of defense when it comes to preventing cyberattacks. To accomplish this, organizations need mature programs that leverage people, processes, and technology to rapidly detect and respond to sophisticated attacks.

The purpose of this presentation is to provide you guidance and a framework that you can apply to building, assessing, and maintaining your security operations center to ensure its success throughout the business lifecycle.

11:00 - 11:50 AM

Why Encryption Is More Important Than Ever in Deterring Cybercrime

  Presented by Micro Focus

With the advancement in capabilities such as Artificial Intelligence, predictive learning analytics and data warehousing, cyber criminals Tactics, Techniques, and Procedures (TTP) have reached levels of sophistication that enables them to gain an edge over traditional Information Security methods used to secure the enterprise. In this presentation, we will show how using Format Preserving Encryption can protect an organization's data, with minimal impact to business and reduce the capabilities of cyber criminals to compromise sensitive data, including from previous hacks.

During this presentation, we will cover:

  • Historical notes of compromised data and why it affects you.
  • An overview of tools used by cyber criminals
  • Strategies that can be used to protect your environment
  • A Live Demo of Format Preserving Encryption
Topics: Information Security
1:00 - 1:50 PM

SecOps: Importance of Config. Mgmt. for Reducing Business Risk in Hybrid IT

  Presented by Micro Focus

In today's IT world, hybrid and multi-cloud environments are the new reality and becoming increasingly more complex. Most organizations manage different technologies with vendor-provided solutions, but the reality is that using disparate solutions for hybrid environments can lead to inefficiencies and even gaps in security. The more vendors involved, the complex this becomes.

Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Grisha Alpernas
DMV IS Operations and Production Manager
Oregon Department of Transportation (ODOT)

Chris Apgar
CEO/President
Apgar & Associates, LLC

Richard Appleyard, PHD
Deputy CIO
Oregon Secretary of State

Ed Arib
Manager, Information Technology
City of Portland – Public Safety Division

Brian Barnett
Director, Information Technology
Hyphn

Caesar Bernardo
Senior Program Manager
Citi

Ben Berry
Executive VP IT and CIO
Bonneville Power Administration

John Blatt
Owner/President
E-Discovery, LLC

Jeff Brewer
Business Information Risk Manager
Conduent Inc.

Brad Buckmaster
Manager, Information Technology
Plaid Pantries, Inc.

Zahid Chaudhry
Branch Chief, WO, CIO, Enterprise Application Development
US Forest Service

Bree DeWolf
IT Governance Manager
Papa Murphy’s International

Theresa Fichtner
Vice President of IT
NW Preferred Federal Credit Union

Stephen Fitton
Technical Solutions Manager
Salem Health

Scott Flaster
Director, Technology
VelocityEHS

Greg Funk
IT Manager
Oregon Child Development Coalition

Erik Gellatly
President
InfraGard Oregon Members’ Alliance

Brenda Gibson
Director, Information Technology
Multnomah University

Robert Gibson
IT Manager
Alta Planning + Design

Patrick Gilbride
Director, Information Technology
City of Vancouver

John Hampton
Director of IT
Erickson Information Services

Ed Hawkins
Manager, Infrastructure and Voice Services
PCC

Bob Hestand
CIO
Neil Kelly Company

Tim Hoffman
Manager, Information Technology
Cardinal Services

Bill Hopkins
Manager, Information Technology
City of Keizer

Don Hornschuch
Sr IT Manager
Qorvo

Janel Hull
Portland Community Manager
ChickTech

Syed Hussain
Chief Information Officer
Oregon Lottery

Munner Koborsi
Senior Manager, IT & Risk Management
EPSON Portland Inc.

Pradeep Kumar
President
SIM-PDX

Janice Levenhagen
CEO/President
ChickTech

Travis Luckey
CIO
Oregon DEQ

Penelople Luedtke
VP of Outreach
PMI Portland Chapter

Rick Lundh
Manager, End User Services
Avangrid Renewables

Thomas Magee
Director of Operations and IT
Urban Airship

Jordan Masanga
Chief Information Officer
Oregon PERS

Theresa Masse
CISO
Port of Portland

Amy McLaughlin
Dir. of Information Technology, Student Health Services
Oregon State University

Karl Middlebrooks
vCIO
Convergence Networks

Larry Miller
CIO
Exterior Wood, Inc

Todd Milliren
IT Director
Lektro, Inc

Vincent Mohr
Director of Information Technology
De La Salle North Catholic High School

Ken Moody
Vice President & Manager, IT
Norris Beggs & Simpson

Jake Niesen
Director of Engineering – Supply
Nike

Joey North
Director, IT & Security
AWS Elemental

Smart Ocholi
Chief, Technical Resources Branch
Engineering Division US Army Corps of Engineers

Christopher Paidhrin
Chief Information Security Officer
City of Portland

Shane Perry
Information Security and Risk Officer
OR Public Employees Retirement System

Jason Pompel
Project Manager
The Standard

Mark Roller
Senior Manager, IT
NW Energy Efficiency Alliance (NEEA)

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
Micro Focus

Micro Focus

Micro Focus
Micro Focus and HPE Software have joined to become one of the largest pure-play software companies in the world. We help customers maximize ROI on existing software investments in Hybrid IT, Security, DevOps, Predictive Analytics and much more.
Visit Website
StorageCraft

StorageCraft

StorageCraft
Arcserve is a global top 5 data protection vendor with best-in-class solutions that manage, protect, and recover all data workloads, from SMB to enterprise and regardless of location or complexity. A 100% channel-centric organization, Arcserve has a presence in over 150 countries, with 19,000 channel partners and 235,000 customers.
Visit Website
Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website
Xiologix

Xiologix

Xiologix
Xiologix is a technology solution provider of business driven multi-vendor IT solutions to customers throughout the US and Canada. They offer a wide variety of hardware and software products from the world's leading IT companies.
Visit Website

SILVER SPONSORS

Atmosera

Atmosera

Atmosera
Atmosera is a leading provider of business-class cloud solutions, providing Azure-managed cloud services for public, hybrid, and private clouds.
Visit Website
Commvault

Commvault

Commvault
Commvault is a worldwide leader in delivering data readiness. Commvault's backup and recovery software enables you to protect, manage, and use your data, while managing it in a consistent, compliant way.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
Dasher Technologies

Dasher Technologies

Dasher Technologies
Dasher Technologies is a leading national IT solution provider, headquartered in the Silicon Valley that designs, delivers, and manages innovative solutions that digitally transform businesses.
Visit Website
ExtraHop

ExtraHop

ExtraHop
ExtraHop delivers enterprise cyber analytics that allow you to quickly investigate threats, ensure the delivery of critical applications, and secure your investment in the cloud.
Visit Website
F5 Networks

F5 Networks

F5 Networks
F5 provides solutions for an application world. F5 helps organizations seamlessly scale cloud, data center, telecommunications, and software defined networking deployments to successfully deliver applications and services to anyone,anywhere, at any time.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet helps organizations across the public and private sectors protect the systems, data, and services that keep businesses and communities running. From government agencies and schools to enterprises and service providers, leaders rely on Fortinet to secure critical infrastructure, ensure operational continuity, and defend against evolving cyber threats. Our Security Fabric platform unifies networking and security to deliver the visibility, control, and efficiency organizations need to operate confidently, whether virtual, in the cloud, or on-premises.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
Illumio

Illumio

Illumio
Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes how workloads and devices are communicating, creates granular segmentation policies which only allow necessary communication, and automatically isolates ransomware and breaches. Assume breach. Minimize impact. Increase resilience.
Visit Website
IVOXY Consulting

IVOXY Consulting

IVOXY Consulting
Since 2006 IVOXY has been delivering right-sized IT solutions & services throughout the Greater Pacific Northwest. We partner with customers throughout all phases of deploying innovative data availability technologies spanning virtualization, networking, storage, automation, security, data protection, cloud, and beyond.
Visit Website
LogRhythm

LogRhythm

LogRhythm
LogRhythm, Inc. is an independent security intelligence company that integrates security information and event management, log management, file integrity monitoring, network forensics, and host forensics.
Visit Website
Malwarebytes

Malwarebytes

Malwarebytes
Malwarebytes protects workplace productivity. We secure all your endpoints so employees can connect confidently, from anywhere. We combine analytics-driven, multi-layer threat protection and industry-leading incident response to both simplify and strengthen overall cybersecurity. You and your team stay up and running, so you can remain focused on driving your business.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website
ServiceNow

ServiceNow

ServiceNow
ServiceNow is changing the way people work. ServiceNow provides service management for every department in the enterprise including IT, human resources, facilities, field service and more.
Visit Website
SHI

SHI

SHI
From designing cloud, data center and end user computing strategies that support your hybrid working model to delivering the hardware and software you need to run it, SHI is your complete IT partner.
Visit Website
Silver Peak

Silver Peak

Silver Peak
Silver Peak, recently acquired by HPE Aruba, delivers networking software that powers a self-driving wide area network (SD_WAN) that learns and adapts to requirements of the business to ensure the highest levels of end user and application performance.
Visit Website
STEALTHbits Technologies 

STEALTHbits Technologies 

STEALTHbits Technologies 
STEALTHbits Technologies is a cybersecurity software company focused on protecting an organization’s sensitive data and the credentials attackers use to steal that data through Active Directory Security and Data Access Governance.
Visit Website
World Wide Technology

World Wide Technology

World Wide Technology
World Wide Technology (WWT) WWT, a $20B, privately held technology solutions provider leading the AI and Digital Revolution, has over 30 years of experience helping the world's largest organizations make the right technology decisions faster. Commercial enterprise, public sector and service provider clients work with WWT from strategy to execution bolstered by hands-on access to cutting-edge capabilities across infrastructure, data and AI, security, cloud and more through the Advanced Technology Center.
Visit Website

BRONZE SPONSORS

10ZiG Technology

10ZiG Technology

10ZiG Technology
10ZiG Technology is a world-market leader in Thin & Zero Client endpoint devices for VDI. 10ZiG offers Intel and AMD based Dual and Quad Core Thin & Zero Clients for VMware, Citrix, and Microsoft environments. Free demo devices are available at 10ZiG.com.
Visit Website
3R Technology

3R Technology

3R Technology
Providing complete ITAD services since 2003, including state-of-the-art secure data destruction, refurbishment, and e-commerce solutions. Our R2:2013 and NAID AAA certifications guarantee environmental safety and sustainability, while ensuring your data and assets are managed responsibly.
Visit Website
Citrix

Citrix

Citrix
Citrix Systems is the global leader and the most trusted name in application delivery infrastructure. More than 200,000 organizations worldwide rely on Citrix to deliver applications with the best performance, highest security and lowest cost.
Visit Website
CrowdStrike

CrowdStrike

CrowdStrike
CrowdStrike® provides cloud-delivered endpoint and workload protection. Leveraging artificial intelligence (AI), the CrowdStrike Falcon® platform protects customers against cyberattacks on endpoints and workloads on or off the network by offering visibility and protection across the enterprise.
Visit Website
Datrium

Datrium

Datrium
Datrium, the leader in automated cloud-native disaster recovery, enables enterprises to get failproof on-demand disaster recovery in the cloud, recover quickly from ransomware attacks and radically simplify data management. Datrium’s industry-leading disaster recovery (DR) with built-in backup is transforming the DR market, enabling enterprises to only pay for recovery when disaster strikes or for testing.
Visit Website
FileWave

FileWave

FileWave
For over 20 years, FileWave has assisted business, education, and government customers to take control of their software deployments, providing granular control of all files in any installation, both pre and post-deployment.
Visit Website
Gigamon

Gigamon

Gigamon
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.
Visit Website
Skybox Security

Skybox Security

Skybox Security
Skybox arms security teams with a powerful set of security management solutions that extract insight from security data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address vulnerabilities and threat exposures.
Visit Website
TechPower

TechPower

TechPower
TechPower is an Hewlett Packard Enterprise Platinum Partner serving customers in the WA, OR and AK region for the last 25 years. At TechPower, we are are ready to assist your organization in building out your new digital transformation environment.
Visit Website
Unitrends

Unitrends

Unitrends
Unitrends is trusted by IT leaders worldwide who know that in today's digital world protecting their ideas and keeping their business running is non-negotiable. The company’s Connected Continuity Platform protects virtual, physical, + cloud based systems.
Visit Website
Western Digital

Western Digital

Western Digital
Western Digital creates environments for data to thrive, helping customers capture, preserve, access and transform an ever-increasing diversity of data.
Visit Website

EXHIBITORS & ASSOCIATIONS

ARMA Oregon

ARMA Oregon

ARMA Oregon
The Oregon Chapter of ARMA provides quality educational programs and is open to all who wish to learn more about information governance and records management.
Visit Website
Business Telecom Products

Business Telecom Products

Business Telecom Products
Over 80% of wireless headsets are replaced needlessly because people don’t know how to care for them or fix minor problems. BTP, your NW Plantronics Authorized Distributor, provides free support, resulting in huge IT savings and fewer headaches.
Visit Website
ByteSpeed

ByteSpeed

ByteSpeed
ByteSpeed has been providing IT Solutions, including custom built hardware, networking solutions, and professional IT services in all 50 states in the US since 1999. https://bytespeed.com/
Visit Website
Cerium Networks

Cerium Networks

Cerium Networks
Cerium is a recognized innovator and leading provider of a full suite of collaboration, contact center, networking, data center, and security solutions. We help medium to large businesses in the Northwest plan for and then realize the positive impact of technology on their business operations, strategies, and user experiences.
Visit Website
ChickTech Portland

ChickTech Portland

ChickTech Portland
ChickTech Portland is a chapter of a national non-profit organization dedicated to increasing the number of women and girls pursuing technology-based careers and retaining women in the technology workforce.
Visit Website
Cohesity

Cohesity

Cohesity
Cohesity delivers a web-scale platform that simplifies data protection, consolidates file and object services, provides instant access to test/dev copies, spans from the edge to the cloud, and performs in-place searches and analytics.
Visit Website
Comcast Business

Comcast Business

Comcast Business
Comcast Business has the largest IP network in the nation, serving small businesses through large enterprises. Technology offerings include Internet and Ethernet connectivity, voice solutions, and SD-WAN on ActiveCore(SM). Learn more at business.comcast.com/enterprise.
Visit Website
CompuNet

CompuNet

CompuNet
CompuNet is a leading U.S. information technology partner, headquartered in Boise, Idaho. The firm specializes in consultation, design and implementation services specifically tailored to solve business problems. With a best-in-class engineering staff and approach, CompuNet focuses on building lasting relationships that prioritize client satisfaction over sales through every step of the journey.
Visit Website
Cylance

Cylance

Cylance
BlackBerry Cylance develops artificial intelligence to deliver prevention-first, predictive security products and smart, simple, secure solutions that change how organizations approach endpoint security.
Visit Website
Dell EMC

Dell EMC

Dell EMC
Dell EMC enables IT and digital business transformation through hybrid cloud and big-data solutions, built on a modern data center infrastructure that incorporates industry-leading converged infrastructure, servers, storage, and cybersecurity technologies
Visit Website
DMD Systems Recovery

DMD Systems Recovery

DMD Systems Recovery
For over 20 years, DMD Systems Recovery has provided secure IT asset disposal services. Our Mission is to mitigate the risks associated with the disposition of sensitive data and retired electronics while maximizing the recovery of residual value.
Visit Website
Everpure

Everpure

Everpure
Create an Enterprise Data Cloud that unifies access, simplifies management, and unlocks the value of your data—only with the Everpure platform.
Visit Website
Extreme Networks

Extreme Networks

Extreme Networks
Extreme Networks, Inc. (EXTR) delivers software-driven networking solutions that help IT departments everywhere deliver the ultimate business outcome: stronger connections with customers, partners and employees.
Visit Website
Garland Technology

Garland Technology

Garland Technology
Garland Technology has developed the industry's most reliable test access points and network packet brokers, enabling data centers to address IT challenges and gain complete network visibility. Visit garlandtechnology.com for more information.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
HPE Juniper Networking

HPE Juniper Networking

HPE Juniper Networking
Juniper Networks is now part of HPE. Together, we're building industry-leading, secure, AI-native networks – purpose-built with and for AI. As AI and networking converge, we're driving a bold transformation across enterprises, service providers, and cloud operators.
Visit Website
IIA Portland

IIA Portland

IIA Portland
Institute of Internal Auditors (IIA) is an international organization serving as the audit profession's global voice, recognized authority, acknowledged leader, chief advocate, and principal educator.
Visit Website
ILTA

ILTA

ILTA
For over three decades, the International Legal Technology Association has led the way in sharing knowledge and experience for those faced with challenges in their firms and legal departments.
Visit Website
InfraGard Oregon

InfraGard Oregon

InfraGard Oregon
InfraGard is an essential part of the FBI's outreach efforts. Infragard allows two-way information sharing about intrusion incidents and system vulnerabilities,provides a channel for the DHS to disseminate analytical threat products to the private sector.
Visit Website
InterVision

InterVision

InterVision
Providing IT solutions, Infrastructure and Services for the Cloud Ecosystem (private, hybrid and public), allowing our customers to achieve the full potential of a Software Defined Data Center.
Visit Website
Iron Mountain

Iron Mountain

Iron Mountain
Iron Mountain Incorporated:registered: is the global leader in storage and information management services. Iron Mountain stores and protects information assets, including critical business documents, and electronic information.
Visit Website
ISSA Portland

ISSA Portland

ISSA Portland
The Information Systems Security Association is a not-for-profit organization of information security professionals. It provides educational forums and peer interaction opportunities that enhance the knowledge and professional growth of its members.
Visit Website
Link SourceIT

Link SourceIT

Link SourceIT
Link Source IT is a complete IT services provider. We provide clients with the highest degree of support for their IT projects by offering solutions tailored to fit the unique needs of their organization.
Visit Website
Matrix Networks

Matrix Networks

Matrix Networks
Helping businesses both big and small accomplish their IT and communication goals by delivering innovative technologies supported by integrity, reliability, and genuine customer care.
Visit Website
NetApp

NetApp

NetApp
NetApp – Our team is data driven. You have a vision for digital transformation. We help you make it all possible.
Visit Website
Nordisk Systems

Nordisk Systems

Nordisk Systems
Nordisk Systems, A Converge Company is a leading technology solutions provider with over three decades of experience in the IT industry. Founded in 1983, Nordisk Systems has been committed to relieving our customer’s technology burdens. We pride ourselves on employing the most highly qualified and certified IT architects and engineers who are up to date with the latest technology from our large database of partners.
Visit Website
Nutanix

Nutanix

Nutanix
Nutanix makes IT infrastructure invisible with an enterprise cloud platform that delivers the agility and economics of the public cloud, without sacrificing the security and control of on-premises infrastructure.
Visit Website
Opus Interactive

Opus Interactive

Opus Interactive
Founded in 1996, Opus Interactive provides custom Cloud and Colocation solutions that fit unique requirements for security, scalability, cost, and future growth needs of its customers.
Visit Website
PDXWIT

PDXWIT

PDXWIT
We are a community-based non-profit organization. Our purpose is to strengthen the Portland women in tech community by offering: educational programs, partnerships, mentorships, resources and opportunities.
Visit Website
PMI Portland

PMI Portland

PMI Portland
PMI Portland Chapter is the local Chapter of the Project Management Institute, the leading advocate of project management, worldwide. PMI has over 430,000 project management professional members in 193 countries around the globe.
Visit Website
RakworX

RakworX

RakworX
RakworX manufactures high-quality data center infrastructure products which provide security, power distribution, and airflow management wherever data is created, processed, transmitted and stored.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website
Ruckus Networks

Ruckus Networks

Ruckus Networks
Ruckus Networks is redefining connectivity around the globe. We build secure wired and wireless access networks for organizations that place a premium on connectivity experiences for end-users as well as simplicity and lower-cost-per-connection for IT.
Visit Website
SIM Portland

SIM Portland

SIM Portland
For over 10 years the Portland Chapter of the Society for Information Management (SIM) has been the meeting place for IT executives, IT consultants, academicians, and sr business executives who play key roles in the use of IT in their organizations.
Visit Website
SonicWall

SonicWall

SonicWall
Over 25 years, SonicWall has been the industry’s trusted security partner. From network security to access security to email security, SonicWall has continuously evolved its product portfolio, enabling organizations to innovate, accelerate and grow.
Visit Website
Symantec

Symantec

Symantec
Symantec helps organizations, governments and people secure their most important data wherever it lives. Organizations look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure.
Visit Website
Vectra AI

Vectra AI

Vectra AI
Vectra AI's Threat Detection and Response Platform protects your business from cyberattacks by detecting attackers in real time and taking immediate action.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website
Veritas

Veritas

Veritas
Optimize the protection, performance, and cyber resiliency of all your enterprise data and applications across any cloud, any environment, at any scale.
Visit Website
VMware

VMware

VMware
At VMware, we believe that software has the power to unlock new opportunities for people and our planet. We look beyond the barriers of compromise to engineer new ways to make technologies work together seamlessly. Our software forms a digital foundation that powers the apps, services and experiences that are transforming the world.
Visit Website
Wilson Electronics

Wilson Electronics

Wilson Electronics
Wilson Electronics manufactures cellular boosters to resolve poor coverage at home, at work or in your vehicle. FCC & Carrier approved solution for all US cell phone carriers. Expanding cost effective wireless network coverage to everyone, everywhere.
Visit Website
WorkSafe Technologies

WorkSafe Technologies

WorkSafe Technologies
WorkSafe Technologies is a leading authority in seismic protection. WorkSafe Technologies' ISO-Base seismic isolation technology is the most effective way to protect mission-critical and expensive electronic equipment in the event of an earthquake.
Visit Website
Wowrack

Wowrack

Wowrack
Wowrack is a global cloud service provider; offering various Hosting services including Managed Hosting Solutions, Dedicated Server Solutions, Colocation, Virtualization, Disaster Recovery, Backup services and much more!
Visit Website

Interested in becoming part of our next Portland event?

CONTACT US FOR INFO

Portland

Oregon Convention Center
Portland Ballroom
777 NE Martin Luther King, Jr. Blvd.
Portland, OR 97232

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.