F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Virtual Portland 2021 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

March 31st, 2021
8:30am – 4:30pm

Virtual Conference
Multi-track seminars with Q&A
1-on-1 chat and networking
Hourly prize drawings

KEYNOTE: Don’t Adopt the Monkey: Leadership Secrets for You, Your Team, and Your Projects

  Presented by Saby Waraich • Chief Information Officer, Clackamas Community College

Seminar Schedule

DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Theater Three
  • Structured Mini Theater
  • Advisor Suite
  • Sessions
  • Keynote
9:00 - 9:50 AM

Automating the Analyst

  Presented by Darktrace

Alongside the rise of today’s dynamic workforce, the speed and scale of sophisticated cyber-attacks are rapidly increasing. As the cybersecurity industry continues to endure an ongoing skills shortage, over-worked and under-resourced teams urgently need augmentation in order to defend against evolving, sophisticated threats.

For over three years, Darktrace experts have been working to meet this challenge, investigating whether they could teach AI to think like a cybersecurity analyst. It takes subtle, nuanced skills and implicit knowledge for an analyst to detect genuinely threatening activity, and the creation of the world-first Cyber AI Analyst took analyzing over one hundred of the world’s top threat analysts and complex machine learning algorithms. Join Darktrace as we discuss the Cyber AI Analyst in action.

Topics: Information Security
10:00 - 10:50 AM

2021 State of Malware

  Presented by Malwarebytes

Over the past year, the tools and tactics of cybercrime and cybersecurity adapted against a backdrop of enormous changes to our lives and businesses.

Join us to learn how cybercrime evolved in 2020 and identify ways to safeguard your organization against what’s out there.

We’ll explore:

  • Top threats for businesses and consumers
  • Emerging cybercrime trends and tactics
  • Solutions you can employ to thwart future attacks
Topics: Information Security
11:00 - 11:50 AM

Situational Awareness Into the Dark Web

  Presented by Check Point Software

In our journey through this session, we take you through the evolution, goals, and motivation of the Dark Web. We will share with you what and whom you can find on the platforms as well as the major conflicts individuals face while exploring this web. The session also exposes you to the syndicates and structures running on the platforms. Surprisingly, we see how those groups were among the first to embrace and implement Blockchain technology and created a major global demand for crypto currencies. This is the time to listen, learn, and be exposed to the deepest secrets of the Dark Web.

Topics: Information Security
12:00 - 12:50 PM

Which is More Complex, Quantum Entanglement or Cybersecurity?

  Presented by INTERFACE Advisory Council

Cybersecurity is hard. Worldwide, billions of dollars are spent each year on cyber prevention and detection, and still, the bad actors breach even the best secured system—and no, I’m not talking about FireEye and SolarWinds in 2020.

Quantum Entanglement is hard to understand, explain, and until recently, hard to prove. Billions of development dollars are spent each year to create reliable and vastly powerful computing platforms—that very soon will change the landscape of encryption as it has been known.

Which is more complex, why does it matter, and how are they related? With wit, humor, and storytelling, Christopher Paidhrin, the CISO for City of Portland and past president of ISSA Portland, will provide you with one or more answers.

Presenter:
Christopher Paidhrin • Chief Information Security Officer, City of Portland

Topics: Information Security
1:00 - 1:50 PM

The Rise of Secure Access Service Edge

  Presented by Bitglass

Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While legacy tools like firewalls are no longer equipped to handle the modern IT ecosystem, SASE platforms are built for this exact moment.

In this presentation, you will learn:

  • The core components SASE
  • The functionality you need to secure cloud, web, and remote access use cases
  • Architectural considerations for SASE platforms
Topics: Information Security
2:00 - 2:50 PM

Cybersecurity Beyond the SIEM

  Presented by Secureworks

For forward-looking organizations, SIEM technology promised to identify security blind spots, reduce noise and alert fatigue, and simplify the detection and response to complex attacks. How well has it lived up to the promise? What gaps have emerged as the pandemic accelerated our digital transformation and adoption of cloud services? In this session, we’ll explore these issues and identify new ways to think about cybersecurity, threat detection, telemetry, and the converging technology needed to meet the challenges of the current threat landscape.

Topics: Information Security
Saby WaraichSaby WaraichChief Information Officer, Clackamas Community College
3:00 - 3:50 PM

Don’t Adopt the Monkey: Leadership Secrets for You, Your Team, and Your Projects

  Presented by Saby Waraich • Chief Information Officer, Clackamas Community College

How do you develop an ability to lead from any position in an organization? How can you be more adept in influencing those over whom you have little or no authority? What are the key skills that are needed for a successful leader? Knowing how to influence and lead others, often without direct authority, is critical in successfully managing projects. Most of us aren't natural leaders. The good news is that leadership skills can be learned. The best makes the journey from manager to leader using their innate talents and through continuous learning and improvement. Don't rely on the school of hard knocks. Discover the secrets to exceptional leadership and the mistakes to avoid on your own road to success.

Energetic … engaging … lively … enthusiastic … inspiring … words that are often used to describe Saby. A speaker with the uncanny ability to look at the normal and see something quite different, Saby shares his life stories and has a fun way to look at life as well as live life. You are guaranteed to learn a thing or two on your journey from his unique perspective. He is a Technology Leader, Angel Investor, Professor, Mentor, Coach, Project & Program Management Expert, Change Leader and Volunteer Leader with a diverse experience of over 20 years in both public and private sector.

An internationally recognized speaker, trainer and coach, Saby has led multiple diverse clients in their business transformation through project successes, bolstering communications across various departments, and assisted customers in creating effective solutions to complex problems. Saby is currently working as CIO at Clackamas Community College. He speaks four languages, enjoys working with people and brings enthusiasm, inspiration & leadership qualities.

Topics: Strategic Management
  • Sessions
9:00 - 9:50 AM

Security vs. Compliance: Turning InfoSec Success into Audit Wins

  Presented by Tripwire

Security and compliance teams both strive to design, establish, and enforce controls to protect an organization. But even with shared goals in place, security and compliance teams often manage business risk in relative isolation. So how can these teams set aside tension and work better together to create a winning alliance?

In this session, we explore the key differences between security and compliance initiatives. It’s crucial to understand that being fully compliant doesn’t necessarily mean an organization is fundamentally secure. We’ll cover how the two initiatives complement each other when it comes to minimizing risk and how both teams can collaborate to create efficiencies. Attendees will learn how to leverage compliance policies to set the foundation to a robust information security program, while providing true visibility and coverage, consolidating toolsets, and reducing costs. Lastly, we’ll discuss how to ensure that a successful security program can help organizations prepare for an upcoming audit to ultimately achieve and maintain continuous compliance.

Topics: Information Security
10:00 - 10:50 AM

Health and Safety Innovations Lay a Smart Digital Foundation

  Presented by Hitachi Vantara and Converge Technology Solutions

The pandemic has accelerated innovation to protect health and safety, while laying a foundation for broader digital transformation across industries. Learn how automated detection of PPE, social distancing, collision avoidance, thermal scanning, and compliance analytics are helping companies reduce risk while protecting their workers and customers, and how this shift is preparing them to thrive in our digital future.

Topics: Infrastructure, Strategic Management
11:00 - 11:50 AM

Unified Endpoint Management

  Presented by Quest Software

This presentation highlights the reasons and need for Unified Endpoint Management in your business strategy. This presentation’s sole purpose is to educate C-level and system administrators of the need for UEM as well as what aspects are important. One of the problems with endpoint management today is the proliferation of endpoints. During this global health crisis especially, we are seeing a large work-from-home movement in businesses all over the world. In order to combat this issue, you must have an endpoint management strategy that works not only on the network but off of it as well.

Topics: Infrastructure, Strategic Management
12:00 - 12:50 PM

Completing Security Visibility with NDR

  Presented by Gigamon

As SOCs have matured, they have employed a number of solutions to combat cybersecurity threats. Traditionally, SOCs have relied on SIEM and EDR tools for their detection and investigation needs. While these tools are critical to security operations, they have their visibility limitations. As such, modern security teams have turned to the network for added detection visibility. Network Detection and Response (NDR) solutions provide the necessary visibility not available in SIEM or EDR solutions and help SOCs complete their security architecture.

In this session, we discuss traditional security architectures and how they are being optimized using NDR into a modern security architecture.

Topics: Information Security
1:00 - 1:50 PM

Hacking Exposed: A Look Inside Hafnium

  Presented by BlackBerry

In this session, we will discuss the latest updates in the Hafnium/ProxyLogon exploits that target on-premises Microsoft Exchange servers. We will also help you understand the threat and potential impact on your organization. In true Hacking Exposed style, we will give a first-hand look at how the exploit works with Brian Robison, Sr. Director Product Marketing & Chief Evangelist, as he walks through and shows what can be done by attackers to a vulnerable server.

Topics: Information Security, Strategic Management
2:00 - 2:50 PM

Disaster Recovery Reality Check: Validating Your DR Strategy

  Presented by StorageCraft

Do you have a DR strategy? Learn more from those on the inside of data protection and disaster recovery. See how you compare to other’s DR capabilities and how to build a solid strategy. We’ll also cover key DRaaS capabilities and a solution to make part of our plan.

Topics: Business Continuity / Disaster Recovery
  • Sessions
9:00 - 9:50 AM

Disaster Recovery Reality Check: Validating Your DR Strategy

  Presented by StorageCraft

Do you have a DR strategy? Learn more from those on the inside of data protection and disaster recovery. See how you compare to other’s DR capabilities and how to build a solid strategy. We’ll also cover key DRaaS capabilities and a solution to make part of our plan.

Topics: Business Continuity / Disaster Recovery
10:00 - 10:50 AM

Not all AI is Created Equal: Understand the Differences of AI/ML/DL

  Presented by Deep Instinct

Machine learning is a big step forward in combatting cyberattacks but is still no silver bullet. Many traditional cybersecurity solutions available today are causing huge operational challenges as they are not adequately fighting against today’s complex and sophisticated threats. Detection and response-based solutions are no longer sufficient as damage can already be done while waiting for the execution of an attack. Executives and security leaders need to start adopting a preventative approach to cybersecurity, which is made possible through Deep Learning.

Fortunately, AI technologies are advancing, and deep learning is proven to be the most effective cybersecurity solution, resulting in unmatched prevention rates with proven lowest false positive rates. As you evaluate new technologies for your organization, understand the differences and benefits of AI/ML/DL.

Topics: Information Security
11:00 - 11:50 AM

First Line of Defense in Assessing your Organizations Cybersecurity Risks

  Presented by Fortinet

Assessing the resilience of your network can dramatically improve your ability to fend off prospective breaches. New applications and services introduce new avenues of attack. Without knowing the potential weaknesses within your network, you cannot successfully defend it.

Join us to hear about:

  • how assessments give you the visibility you need to make more informed, data-driven decisions
  • how you can prioritize strategic initiatives and obtain budgeting more easily by running assessments
  • how certain verticals (education, healthcare, et al.) can benefit from understanding their specific threat landscapes and common industry-wide threats.

During this session we will also cover:

  • a firsthand demonstration on how data is collected and processed, and logs are analyzed from your network during an assessment
  • contents of a sample findings report and how recommendations can help prioritize your security strategy

Assessment offering:
Schedule an assessment, and you will receive a complimentary Fortinet branded Basecamp Rapids Wireless Speaker. Once the assessment has been completed, will receive a pair of FortiVans (limit 50). Note that SLED customers may not be eligible for giveaway items.

Topics: Information Security
12:00 - 12:50 PM

Meaningful Insights from Unstructured Data & Why One Financial Model Doesn’t Work

  Presented by Hitachi Vantara and Converge Technology Solutions

Join us for this double presentation on Unstructured Data and why one financial model does not work.

Unstructured Data has become the future of business operations. Learn how to leverage your data and generate meaningful insights that will help you grow and expand.

We are complex organizations; therefore, one financial model does not work. Businesses of all sizes are only becoming more complex and diversified. Examine this current situation and why it is important to leverage multiple financial models to achieve success.

Topics: Infrastructure
1:00 - 1:50 PM

CI/CD for Networking: Adopting DevOps Principles for a More Robust Network

  Presented by Infoblox

In recent years, continuous integration and continuous deployment, aka CI/CD, have become de facto standards for DevOps-minded software development organizations. Adoption of CI/CD enables software architects and IT specialists to create more flexible, secure and agile infrastructure with new features and functionality that are continually improved and deployed. While compute and storage aspects of environments have benefited greatly from CI/CD, network infrastructure has lagged behind.

This presentation pulls back the covers on efforts taking place to bring CI/CD philosophies to the work of revamping legacy, monolithic network architectures using cloud-native principles, microservices and containerization. The end goal is to create networks that are inherently more adaptable, scalable, automated and simpler to manage.

Speaker Bio: Glenn Sullivan is a Principal Product Manager for Emerging Technologies at Infoblox and joined the Infoblox team when SnapRoute, a company he co-founded in 2015, was acquired by Infoblox. At SnapRoute, Sullivan was responsible for product direction by advocating for the end-user. Prior to founding SnapRoute, Sullivan was responsible for building out hyperscale data center environments at Apple. In addition to core network operational functions, Sullivan led efforts to automate the lifecycle management of various platforms in a multivendor environment. Before Apple, Sullivan was a specialist support engineer on the LAN Switching team in Cisco TAC. While there, his specialty was in turning around customer sentiment by focusing on escalated issues and transforming the customer experience into a positive one. Sullivan has a BS in Network and Systems Administration from RIT (Rochester Institute of Technology).

Topics: Infrastructure, Unified Communications
2:00 - 2:50 PM

The Importance of a Risk-Aware Culture

  Presented by Code42

As companies double down on time to innovation, time to market, time to revenue, they are inherently introducing more risk from the inside. The more cloud-based, collaborative, and fast an organization becomes, the greater the Insider Risks posed to its people, technology, and data. The upside is that cloud collaboration tools make employees more productive. The downside is that these same tools make it easier to exfiltrate data. Add the complexities of working from home and off the corporate network; more employees are routinely using unauthorized devices, tools, and cloud-based applications to share files and ideas with colleagues.

Join us to discuss the growing insider risk problem and how the right data protection methods can set security teams up for success, without slowing down company productivity.

Topics: Information Security
  • Sessions
9:00 - 9:50 AM

Disasters Happen. Cloud Will Help You Recover.

  Presented by iland

Malicious ransomware attacks. Unplanned outages. Devastating natural disasters. It’s obvious why Disaster Recovery (DR) is no longer a luxury for your organization. It’s a necessity! It could also be the one thing keeping your business up and running no matter what. What do you need to become truly IT resilient? In this presentation, you will:

  • Learn how organizations are successfully using cloud-based DR
  • Hear why cloud changes the cost model to make DR finally reachable
  • See how the iland Secure Cloud Console can automate, orchestrate, and test with successful, repeatable results
  • Understand why full visibility, management, reporting, and documentation make the transition to cloud resources seamless
    • Join Gartner DR Magic Quadrant Leader iland and Veeam, with trusted IT guidance from Structured, to learn how we can help you create the right disaster recovery solution.

Topics: Business Continuity / Disaster Recovery
10:00 - 10:50 AM

The Case for Automation: Why Every Business Needs It

  Presented by Aruba Networks

As networks evolved from delivering basic connectivity (wired and wireless) to more sophisticated needs, enterprise security has moved from a strong, wall methodology to untrusted connections for every user. Join us to learn how network automation can reduce the burden on IT staff to keep up with the latest networking requirements while safely connecting workers, customers, and citizens to critical services.

Topics: Information Security
11:00 - 11:50 AM

The Anatomy of the SolarWinds Attack

  Presented by CyberArk

In early December 2020, a supply chain attack was discovered which “trojanized” SolarWinds Orion business software updates in order to distribute malware. The campaign successfully infected 18,000 organizations – including several government agencies and high-value companies around the world.

Attacks of this magnitude and sophistication have a vast and rippling impact. Whether you have been directly affected or not – we are witnessing a new level of attack sophistication that demands a closer understanding.

In this session we’ll cover:

  • The rise of the digital supply chain attack
  • An attacker’s perspective on Orion
  • An end-to-end review of the attack flow
  • How the attackers managed to trojanize SolarWinds code
  • What the attackers did during months of seeming inactivity
  • A review of the Golden SAML technique
  • The big picture – what ‘Solorigate’ means for attackers and defenders
Topics: Information Security
1:00 - 1:50 PM

Discover How SD-WAN Edge and Cloud Security are Enabling Digital Transformation

  Presented by Silver Peak

Adoption of cloud services and the explosive increase in mobile and IoT devices have driven enterprises to transform both their WAN and security architectures – not just one or the other. The strategic imperative is to deploy a more intelligent, highly automated software-defined wide area network (WAN) that can be seamlessly integrated with modern cloud-delivered security services. Gartner coined the term “secure access service edge” (SASE) to describe this cloud-first architecture. During this session, we’ll discuss:

  • SD-WAN and security considerations enterprises must address when migrating to a SASE architecture
  • How to address Zero Trust access security requirements for remote workers and IoT
  • Pros and cons of single vendor vs multi-vendor SASE implementations
Topics: Data Storage, Infrastructure
2:00 - 2:50 PM

Real-Time Defender Velocity: Code on Code Warfare

  Presented by SentinelOne

Organizations spend more money on cyber security tools every year, yet the number of breaches and the cost of these breaches continues to increase. A new approach is needed that relies on autonomous analysis that can respond at machine speed. By embracing automation, AI, and big data analytics, organizations can better prevent threats, find, and detect what is missed, provide contextual linking for forensic and threat hunting ¬– and even more importantly – self-heal and fully recover when necessary.

Topics: Information Security
  • Sessions
On Demand

Fostering Inclusion in a Remote Work Environment

  Presented by PDX WIT

Underrepresented groups are disproportionately affected by this pandemic and its economic fallout. The requirement to work from home brings its own set of challenges. Employees depend on their immediate managers for support in these unique circumstances, but everyone can play a role. This presentation will explore how everyone on the team (particularly those in leadership roles) can continue to foster an inclusive work environment for their distributed teams.

Presenter:
Molly Lebowitz • Management Consultant at Propeller and PDX Women in Tech Representative

Topics: Strategic Management

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Richard Appleyard
Chief Information Officer
Oregon State Police

Ed Arib
Manager, Technology
Portland Police Bureau

Brian Barnett
Director, Information Technology
Hyphn

Caesar Bernardo
Sr Technical Program Manager
IGNW

Michael Bray
Chief Information Security Officer
The Vancouver Clinic

Jeff Brewer
Manager, Business Information Risk
Conduent, Inc.

Brad Buckmaster
Manager, Information Technology
Plaid Pantries, Inc.

Theresa Fichtner
Vice President, Information Technology
NW Preferred Federal Credit Union

Stephen Fitton
Head of Information Systems
Fairchild Medical Center

Greg Funk
Manager, Information Technology
Oregon Child Development Coalitio

Jimmy Godard
SVP, Program Manager
Bank of America

Bob Hestand
Chief Information Officer
Neil Kelly Company

Joe Holstein
Manager, Infrastructure
Multnomah Athletic Club

Bill Hopkins
Manager, Information Technology
City of Keizer

Don Hornschuch
Sr Manager, Information Technology
Qorvo

Syed Hussain
Chief Information Officer
Oregon Lottery

Muneer Koborsi
Sr Manager, IT & Risk Management
Epson

Amy McLaughlin
Director, Information Services
Oregon State University

Ty Melero
Sr Manager, IT Operations
The Vancouver Clinic

Vincent Mohr
Director, Information Technology
De La Salle North Catholic High School

Ken Moody
Vice President & Manager, IT
Norris Beggs & Simpson

Jake Niesen
Director, Technical Capability
Nike

Smart Ocholi
Chief, Technical Resources Branch
Engineering Division US Army Corps of Engineers

Christopher Paidhrin
Chief Information Security Officer
City of Portland

Josh Renoe
Director, Information Technology
The Management Group

Mark Roller
Sr Manager, Information Technology
NW Energy Efficiency Alliance (NEEA)

Linda Rudawitz
Director, Information Technology
Warner Pacific University

Greg Sanker
Chief Information Officer
Oregon Department of Administrative Services

Sergey Sergeyev
Chief IT Enterprise Architect
Umpqua Bank

Nathan Struk
Manager, Information Technology
Business Valuation Resources

Sean Ventura
Chief Information Security Officer
Atmosera

Marie VerMeer
Director, Global IS Operations
Columbia Sportswear Company

Gary Vermeulen
Manager, Information Technology
WR Grace

Saby Waraich
Chief Information Officer
Clackamas Community College

Ron White
Sr Infrastructure Systems Administrator
C-Tran

Scott White
Director, Information Technology
Bridgewell Resources LLC

Shane Perry
Information Security and Risk Officer
OR Public Employees Retirement System

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Converge Technology Solutions

Converge Technology Solutions

Converge Technology Solutions
Converge Technology Solutions Corp. is a North American software-enabled, Hybrid IT Solution Provider focused on delivering industry leading solutions and services. Converge’s regional sales and services organizations deliver advanced analytics, cloud, cybersecurity, and managed services offerings to clients across various industries.
Visit Website
Hitachi Vantara

Hitachi Vantara

Hitachi Vantara
Hitachi Vantara helps enterprises create and derive value from their data. Its solutions include best-in-class data management, IT infrastructure and analytics products, IoT solutions and Smart Spaces technologies for a broad range of industries.
Visit Website
StorageCraft

StorageCraft

StorageCraft
Arcserve is a global top 5 data protection vendor with best-in-class solutions that manage, protect, and recover all data workloads, from SMB to enterprise and regardless of location or complexity. A 100% channel-centric organization, Arcserve has a presence in over 150 countries, with 19,000 channel partners and 235,000 customers.
Visit Website
Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

Bitglass

Bitglass

Bitglass
Bitglass’ Total Cloud Security Platform is the only secure access service edge offering that combines a Gartner-MQ-Leading cloud access security broker, the world’s only on-device secure web gateway, and zero trust network access to secure any interaction.
Visit Website
BlackBerry

BlackBerry

BlackBerry
BlackBerry Cybersecurity is a leader in endpoint security, endpoint management, encryption, and embedded systems, protecting enterprises and governments around the world. Our end-to-end approach is deeply rooted in Cylance® AI and machine learning, providing continuous preventative protection, detection, and instant response. We extend protection for your organization against current and future cyberthreats by combining network and endpoint telemetry and by delivering innovative solutions in the areas of cybersecurity, safety, and data privacy.
Visit Website
Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
Code42

Code42

Code42
Code42 is the Insider Risk Management leader. Native to the cloud, Code42 Incydr rapidly detects data loss, leak, theft and sabotage as well as speeds incident response – all without lengthy deployments, complex policy management or blocking employee productivity.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
Deep Instinct

Deep Instinct

Deep Instinct
Deep Instinct is an advanced endpoint security solution based on deep learning, providing a more advanced form of threat protection than AI cybersecurity or machine learning-based solutions that are available in the market.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface & the power to take on the ever-increasing performance requirements of the borderless network – today and into the future.
Visit Website
Gigamon

Gigamon

Gigamon
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.
Visit Website
Infoblox

Infoblox

Infoblox
Infoblox unites networking and security to deliver unmatched performance and protection. Trusted by Fortune 100 companies and emerging innovators, we provide real-time visibility and control over who and what connects to your network, so your organization runs faster and stops threats earlier.
Visit Website
Malwarebytes

Malwarebytes

Malwarebytes
Malwarebytes protects workplace productivity. We secure all your endpoints so employees can connect confidently, from anywhere. We combine analytics-driven, multi-layer threat protection and industry-leading incident response to both simplify and strengthen overall cybersecurity. You and your team stay up and running, so you can remain focused on driving your business.
Visit Website
Quest Software

Quest Software

Quest Software
At Quest, we solve complex problems with simple solutions. Our philosophy is focused on great products, great service and being simple to do business with. We deliver technology that eliminates the need to choose between efficiency and effectiveness.
Visit Website
Secureworks

Secureworks

Secureworks
Secureworks is a global cybersecurity leader that protects customer progress with a cloud-native security analytics platform built on 20+ years of threat intelligence, improving the ability to detect advanced threats, streamline investigations, and automate the right actions.
Visit Website
TRIPWIRE

TRIPWIRE

TRIPWIRE
Tripwire delivers advanced threat, security and compliance solutions used by over 9,000 organizations, including over 50% of the Fortune 500. Tripwire enables enterprises around the world to detect, prevent, report and respond to cyber security threats.
Visit Website

BRONZE SPONSORS

Extreme Networks

Extreme Networks

Extreme Networks
Extreme Networks, Inc. (EXTR) delivers software-driven networking solutions that help IT departments everywhere deliver the ultimate business outcome: stronger connections with customers, partners and employees.
Visit Website
iboss

iboss

iboss
iboss is a cloud security company that provides organizations and their employees fast and secure access to the Internet on any device, from any location, in the cloud.
Visit Website
Proofpoint

Proofpoint

Proofpoint
Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website

EXHIBITORS & ASSOCIATIONS

Airgap

Airgap

Airgap
Airgap's Agentless Zero Trust Isolation™ platform is the best defense against ransomware propagation. Put an end to threat propagation and protect your infrastructure - in minutes, not months.
Visit Website
ARMA Oregon

ARMA Oregon

ARMA Oregon
The Oregon Chapter of ARMA provides quality educational programs and is open to all who wish to learn more about information governance and records management.
Visit Website
ASIS Columbia River

ASIS Columbia River

ASIS Columbia River
ASIS International is THE organization for security professionals. ASIS is dedicated to increasing the effectiveness and productivity of security professionals by developing educational programs and materials that address broad security interests.
Visit Website
ChickTech Portland

ChickTech Portland

ChickTech Portland
ChickTech Portland is a chapter of a national non-profit organization dedicated to increasing the number of women and girls pursuing technology-based careers and retaining women in the technology workforce.
Visit Website
CyberArk

CyberArk

CyberArk
Get the most complete Identity Security and Access Management Solutions that enable secure access across any device, anywhere, at just the right time.
Visit Website
ExtraHop

ExtraHop

ExtraHop
ExtraHop delivers enterprise cyber analytics that allow you to quickly investigate threats, ensure the delivery of critical applications, and secure your investment in the cloud.
Visit Website
HDI Oregon

HDI Oregon

HDI Oregon
HDI is the world’s largest IT service & technical support membership association and the industry’s premier certification and training body. Guided by an international panel of industry experts and practitioners.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
iland Cloud

iland Cloud

iland Cloud
iland is an industry-leading provider of secure application and data protection cloud services built on proven VMware technology. With nine data centers on four continents, analysts recognize iland as a global leader in disaster recovery.
Visit Website
InfraGard Oregon

InfraGard Oregon

InfraGard Oregon
InfraGard is an essential part of the FBI's outreach efforts. Infragard allows two-way information sharing about intrusion incidents and system vulnerabilities,provides a channel for the DHS to disseminate analytical threat products to the private sector.
Visit Website
ISSA Portland

ISSA Portland

ISSA Portland
The Information Systems Security Association is a not-for-profit organization of information security professionals. It provides educational forums and peer interaction opportunities that enhance the knowledge and professional growth of its members.
Visit Website
Matrix Networks

Matrix Networks

Matrix Networks
Helping businesses both big and small accomplish their IT and communication goals by delivering innovative technologies supported by integrity, reliability, and genuine customer care.
Visit Website
PDXWIT

PDXWIT

PDXWIT
We are a community-based non-profit organization. Our purpose is to strengthen the Portland women in tech community by offering: educational programs, partnerships, mentorships, resources and opportunities.
Visit Website
PMI Portland

PMI Portland

PMI Portland
PMI Portland Chapter is the local Chapter of the Project Management Institute, the leading advocate of project management, worldwide. PMI has over 430,000 project management professional members in 193 countries around the globe.
Visit Website
SentinelOne

SentinelOne

SentinelOne
SentinelOne is the future of Endpoint Protection. It unifies prevention, detection and response in a single platform driven by sophisticated machine learning and intelligent automation. It can adapt your defenses against the most advanced cyber-attacks.
Visit Website
Silver Peak

Silver Peak

Silver Peak
Silver Peak, recently acquired by HPE Aruba, delivers networking software that powers a self-driving wide area network (SD_WAN) that learns and adapts to requirements of the business to ensure the highest levels of end user and application performance.
Visit Website
SIM Portland

SIM Portland

SIM Portland
For over 10 years the Portland Chapter of the Society for Information Management (SIM) has been the meeting place for IT executives, IT consultants, academicians, and sr business executives who play key roles in the use of IT in their organizations.
Visit Website
Technology Association of Oregon

Technology Association of Oregon

Technology Association of Oregon
The Technology Association of Oregon is the largest professional technology association in Oregon and SW Washington. TAO drives economic development by promoting, connecting, and advocating for companies involved in the software and technology industries.
Visit Website

Interested in becoming part of our next Portland event?

CONTACT US FOR INFO

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.