F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Virtual Portland 2022 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Portland EVENTS

AT A GLANCE

March 17th, 2022
8:30am – 4:30pm

Virtual Conference
Multi-track seminars with Q&A
1-on-1 chat and networking
Hourly prize drawings

KEYNOTE: [1 CPE] Know your Leadership Compass: A Roadmap to Lead with Passion and Purpose

  Presented by Jimmy Godard • SVP, Program Manager, Bank of America

Seminar Schedule

  • Theater One
  • Theater Two
  • Theater Three
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] How to Advance Strategic Business Goals with IoT

  Presented by Aruba, a HPE Company

Whether it’s the allure of the concept of the Internet of Things (IoT), a fear of being viewed as a laggard, or internal pressure to do something new, many companies rush head-first into IoT projects without clearly defined objectives or value propositions. The result is a high rate of failure and subsequent disillusionment about the real value of IoT. If your company’s strategic goals require human productivity monitoring, human productivity organizational redesign, augmented reality, energy monitoring, and/or building security, Aruba’s ESP can expedite time-to-insight and time-to-value. The solutions can securely handle all manner of IoT devices and integrate them with enterprise business applications and processes. Join us to learn how you can reduce IoT deployment time to a fraction of what a custom-developed solution would require.

Topics: Infrastructure, Strategic Management
10:00 - 10:50 AM

[1 CPE] Zero-Trust Architectures

  Presented by Rubrik

Organizations have invested heavily in IT security, attempting to fortify their perimeter, network, endpoint, and application protections. Despite these investments, hackers are successfully penetrating these defenses and targeting enterprise data, including backup data. Ransomware is starting to specifically target online backups by encrypting or deleting them. If your organization was the target of an attack today, how do you know what data was impacted and where? Manually sifting through millions of files and comparing each snapshot consumes FTE time and prolongs recovery exponentially. Mass restores of the entire environment could mean high data loss and weeks' worth of work down the drain. In this session, we will discuss how to protect your last line of defense, the backups. We will walk through the anatomy of a recovery, the best practices, and advanced tools to ensure you will not have to pay a ransom, and how to quickly recover your data to continue business operations.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Leveraging Assessment Findings to Harden Your Security Perimeter

  Presented by Fortinet

Are you regularly evaluating your network security?

Performing assessments is a tried-and-true method for improving your security posture, but they can be a daunting task for network security staff who are often short on manpower, expertise, and/or time. Regardless, the benefits of running assessments almost always outweigh any potential drawbacks. Having a security assessment in hand will increase your security situational awareness and significantly impact your organization’s risk preparedness and mitigation.

Join us as we discuss the importance of periodically validating your existing security controls and provide learnings and best practices from our experts.

Topics: Information Security
12:00 - 12:50 PM

[1 CPE] Thinking Upstream: Avoid the Fallout of the next Log4Shell

  Presented by Tidelift

News of a zero-day vulnerability in the popular open-source project Log4j broke in December, leading many organizations scrambling to figure out the impact on their applications. Nearly every organization developing applications was impacted, and the fallout was so broad that the FTC issued guidance.

Log4Shell comes on the heels of the U.S. White House cybersecurity executive order 14028, an attempt by the United States government to use its purchasing power to create positive changes to the way cybersecurity is addressed around the world.

Recent high-profile breaches like Log4Shell, the Colonial Pipeline ransomware attack, or the SolarWinds software supply chain attack have shown that our cybersecurity defenses are woefully inadequate. This executive order forces a higher standard of cybersecurity for any organization selling software to the federal government, which in turn makes it the de facto global standard for all software in the future.

Tidelift CEO and co-founder Donald Fischer shares his perspective on how the Log4Shell vulnerability and the cybersecurity executive order impact software supply chain security. He’ll brief attendees on the key issues addressed by the executive order, including software bill of materials (SBOM), supply chain security, and provenance requirements. He’ll outline the gaps that most organizations will need to close to stay in compliance. And he’ll share a proactive approach to addressing open-source software supply chain health and security upstream.

If you want to ensure your organization is fully prepared for the coming changes, you won’t want to miss this session.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Immutable Storage: Level-Up Ransomware Readiness

  Presented by Arcserve

IDC advises that a 3-2-1-1 strategy is the new best practice for effectively protecting customers against ransomware. The last 1 is the important piece of the puzzle, where a copy is also stored on immutable storage. The growing risk of compromise to your customers’ data – specifically via ransomware DEMANDS the most up to date and complete solutions arsenal.

Topics: Data Storage, Information Security
2:00 - 2:50 PM

[1 CPE] Ransomware – Who, What, Why & How…

  Presented by Check Point

Over the last 12 months, ransomware attacks surged by 93% with a devastating impact on businesses and industries worldwide. In today’s hybrid IT environment, preventing ransomware attacks seems like an impossible feat. But is it?

In this session, we will cover the latest ransomware trends and how you can protect your organization from falling victim to sophisticated ransomware attacks.

Topics: Information Security
Jimmy GodardJimmy GodardSVP, Program Manager, Bank of America
3:00 - 3:50 PM

[1 CPE] Know your Leadership Compass: A Roadmap to Lead with Passion and Purpose

  Presented by Jimmy Godard • SVP, Program Manager, Bank of America

Business leaders, managers, and directors may be brilliant leaders in one situation and not have the same results in another. Management gurus agree: Anyone can lead, but not everyone can be a successful leader. The previously embraced command-and-control techniques are increasingly ineffective. Today's business environment demands leaders to be alert, agile, enterprising, and skilled in the art of diplomacy. As a leader, it's imperative to articulate who you are, what you stand for, and why you're excited to lead your team.

Are these areas you feel you need to develop? Do you have a compass to guide you on your journey leading your teams through challenging times, staying flexible in dealing with them, and responding to them in ways that address their needs and interests? "Developing your Leadership Compass" is a highly-interactive, reflective process that sets a path to transformational leadership.

Jimmy J Godard is an entrepreneur, philanthropist, and one of the best at organizational IT changes. For more than 22 years, he has led global changes with diverse teams, helped non-profit organizations, coached IT leaders at leading with passion and purpose and reaching their full potential.

Jimmy’s leadership journey and professional experience over the last two decades in the worlds of information technology and business are incredible. He made his debut in the financial industry as a peak-time teller. He ascended to a Senior program, change, and service delivery manager. He implements global technology changes that have an impact on people, process, and technology.

He has a unique perspective both on the business and technology sides. He holds a Master’s Degree in Computer Information Systems, a Master's Degree in Business Administration (MBA), is a certified goal success coach, and is currently pursuing a Doctorate of Management in Organizational Leadership with a specialization in Information Systems and Technology. He is an instigator of process improvement and innovation with an unwavering determination to bring about results. He implements global technology integration efforts for Infrastructure, End User Computing, Mergers, Acquisitions, and Divestitures.

Jimmy is very involved in philanthropist activities in the Portland and SW Washington communities. He is an active coach of soccer (2-3 teams). He also performs service projects yearly around the globe including and not limited to the countries of Haiti, Cambodia, Uganda, and Nigeria.

Today, Jimmy is a sought-after international speaker, goal success coach, project manager, program manager, and IT adviser. Jimmy is an excellent choice for businesses, nonprofits, leaders, project teams, business analysis, and boards looking for coaching and consulting on project, program, and change management.

Topics: Culture
  • Sessions
9:00 - 9:50 AM

[1 CPE] Fast and Furious Attacks: Using AI to Surgically Respond

  Presented by Darktrace

Fast-moving cyber-attacks can strike at any time, and security teams are often unable to react quickly enough. Join Brianna Leddy, Director of Analysis, to learn how Autonomous Response takes targeted action to stop in-progress attacks, without disrupting your business. Explore today’s threats and challenges and learn how advances in AI have been leveraged to allow for very surgical actions to be taken autonomously – where humans can no longer react fast enough. Includes real-world threat finds, case studies and attack scenarios.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Payment Card Industry Compliance: How to Become and Stay Compliant

  Presented by Structured

This presentation will discuss the difficulties of becoming and staying compliant with Payment Card Industry (PCI) requirements. Although currently in version 3.2.1, the updated Data Security Standard (DSS) 4.0 is coming soon and there are numerous changes and enhancements that must be complied with. Whether you are just beginning with PCI for your organization or have many years of experience, there are many challenges, both old and new that can create roadblocks to compliance. With emerging technologies such as zero-trust architecture ready for implementation, find out how to best use these controls for your organizational goals. This presentation will cover the requirements, trouble areas to be aware of, and how you can utilize specific technology in your compliance effort.

Topics: Infrastructure
11:00 - 11:50 AM

[1 CPE] Sky Lakes Case Study: Real-life Ransomware Recovery

  Presented by Cohesity

Backup is often the last line of defense against ransomware attacks, which have exponentially increased over the last year. Hear how Sky Lakes Medical Center chose a joint solution from strategic partners Cisco and Cohesity for a modern, efficient data management system to replace an aging backup solution while beating an unexpected ransomware attack. During this session, we’ll give you a brief overview of Cohesity for context and then roll into a 40-minute interview with the Sky Lakes Medical Center Team.

Topics: Information Security
12:00 - 12:50 PM

[1 CPE] The Privacy Roadmap: What You Need to Know About Data Privacy Now and Moving Forward

  Presented by INTERFACE Advisory Council

First, GDPR came into law in the European Union. Then in January of 2020, the California Consumer Privacy Act took effect. Privacy laws are now a reality for all IT professionals to deal with. Are you sharing any data with third parties? How is your data stored? Have you verified all the needed compliance regulations for data in the cloud? These are just some of the many questions IT professionals need to be ready for when it comes to the current state of data privacy.

Join the INTERFACE Portland Advisory Council for a discussion on these topics and more. We will discuss setting up the right program for your operation. There will also be tips shared from handling the newest privacy laws and how these items differ from traditional cyber security preparations. Our panel of local IT leaders will offer their experiences from the last couple of years with the rapid growth in data privacy laws and how it affects the IT industry.

Panelists
Stephen Fitton • Technology Consultant, Providence
Steve Hankel • Vice President of Information Technology, Johanson Transportation Service
Matt Olson • Senior Director of Compliance and Security, Higher Logic
Shane Perry • Information Security and Risk Officer, OR Public Employees Retirement System

Topics: Data Management
1:00 - 1:50 PM

[1 CPE] SASE: The Power of Convergence

  Presented by Palo Alto Networks

Fueled by digital transformation and a massive shift to work-from-home, traditional enterprise networking and security infrastructures have been stretched to the breaking point. Legacy on-premises point-product approaches of yesteryear simply don’t make sense anymore. It’s time for a new model with the Secure Access Service Edge, or SASE (pronounced “sassy”).

SASE is quickly becoming the predominant network and security architecture that underpins our post-COVID world. SASE is the convergence of network services like SD-WAN, and security services like FWaaS, SWG, CASB, and ZTNA, into a single, cloud-delivered service model.

Join this presentation to learn:

  • Why networking and security must converge in the cloud
  • The key use cases driving SASE adoption
  • Real-world case studies of customers who have adopted SASE
Topics: Strategic Management
2:00 - 2:50 PM

[1 CPE] Deploying DLP for All of the Wrong Reasons

  Presented by Proofpoint

Data Loss Prevention is a misnamed and misapplied technology – not all data is in scope, you will never cover every loss scenario, and while protecting data sounds like a great idea in theory, in practice data protection isn’t always the optimal goal. Many organizations are required to deploy DLP technology to comply with a regulatory compliance requirement or to protect specific intellectual property. Most DLP projects end up in a much different state than their original design and intent.

This session will cover a brief history of DLP, how you should go about taking a people-centric approach to designing your information protection program, and using metrics for success that matter, as well as how to communicate your program to a non-technical audience.

Speaker Bio:

Brian Reed is the Director of Cybersecurity Strategy at Proofpoint. He has 20+ years of information technology experience. Before Proofpoint, Brian was a senior director analyst at Gartner. Since 2015, he published over 50 research notes at Gartner, covering a wide range of cybersecurity and risk management topics.

Before Gartner, he spent many years in a variety of business development, product management, sales, and system engineering roles. Brian also serves as an advisory board member and holds a Bachelor of Arts degree in History from The University of Georgia and a Master’s in Business Administration from Kennesaw State University.

Topics: Information Security
  • Sessions
2:00 - 2:50 PM

[1 CPE] Changes in Ransomware, Why Companies Still Fail to Respond, & What You Can Do Now

  Presented by Trey Blalock • Chief Security Advisor, Verification Labs

In this fast-paced must-see talk, Trey Blalock will walk participants through a wide variety of new threats and attack techniques impacting organizations and discuss the tools, technologies, and tips you can implement to protect your organization. This talk will be a fun information-rich talk accessible to anyone who wants to learn more about security, ransomware, or defense techniques.

Trey Blalock is a highly respected security specialist who has performed extensive work in almost every security domain for some of the world's largest corporations and governments. Trey has trained thousands of people on advanced security topics. He has managed all aspects of security for one of the world's largest financial transaction hubs, performed hundreds of penetration tests for Fortune 500 companies, and has performed forensics for several high-profile cases such as "Donald Vance vs. Donald Rumsfeld." He also specializes in defending large-scale systems from advanced threat actors. Trey currently serves on several forensic, red teaming, and penetration testing advisory boards, is a frequent guest on television, recently served as the CISO for Coinstar, and is currently the CISO of Cognira.

Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Richard Appleyard
Chief Information Officer
Oregon State Police

Brian Barnett
Director, Information Technology
Hyphn

Jeremy Bennett
Director, Information Systems
Therapeutic Associates, Inc.

Michael Bray
Chief Information Security Officer
The Vancouver Clinic

Jeff Brewer
Manager, Business Information Risk
Conduent, Inc.

Brad Buckmaster
Manager, Information Technology
Plaid Pantries, Inc.

Theresa Fichtner
Vice President of IT
NW Preferred Federal Credit Union

Stephen Fitton
Technology Consultant
Providence

Greg Funk
Manager, Information Technology
Oregon Child Development Coalition

Juan Gamboa
Manager, Information Technology
Kokusai Semiconductor Equipment Corp

Brandon Gatke
CIO / CISO
Pacific University

Robert Gibson
Director, Information Technologies
Alta Planning + Design

Jimmy Godard
SVP, Program Manager
Bank of America

Steve Hankel
Vice President, Information Technology
Johanson Transportation Service

Eric Hardin
Director, Data Protection Analysis
Nike

Bob Hestand
Chief Information Officer
Neil Kelly Company

Bill Hopkins
Manager, Information Technology
OR City of Keizer

Syed Hussain
Chief Information Officer
Oregon Lottery

Muneer Koborsi
Sr Manager, IT & Risk Management
Epson

Travis Luckey
Chief Information Officer
OR Dept of Environmental Quality

Gabe Martushev
Vice President, IT Security
Finity Communications, Inc.

Sean McKay
Chief Information Security Officer
Portland State University

Amy McLaughlin
Executive Director, Technical & Solutions Architecture
Oregon State University

Larry Miller
Chief Information Officer
Exterior Wood, Inc.

Vincent Mohr
Director, Information Technology
De La Salle North Catholic High School

Andrew Nemec
Sr Director, Information Security
Comscore, Inc.

Jake Niesen
Director, Technical Capability
Nike

Smart Ocholi
Chief, Technical Resources Branch
US Army Corps of Engineers Engineering Division

Jeff Olson
Chief Technology Officer
Legacy Health

Christopher Paidhrin
Chief Information Security Officer
OR City of Portland

Shane Perry
Information Security and Risk Officer
OR Public Employees Retirement System

Josh Renoe
Director, Information Technology
The Management Group

Mark Roller
Sr Manager, Information Technology
NW Energy Efficiency Alliance

Greg Sanker
Director, IT Support
Taylor Morrison

Nathan Struk
Manager, Information Technology
Business Valuation Resources

Frank Taylor
Manager, Information Technology
Nvoicepay, Inc.

Marie VerMeer
Director, Global IS Operations
Columbia Sportswear Company

Gary Vermeulen
Manager, Information Technology
WR Grace

Saby Waraich
Chief Information Officer
Clackamas Community College

Ron White
Sr Infrastructure Systems Administrator
C-Tran

Scott White
Director, Information Technology
Bridgewell Resources LLC

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

Arcserve

Arcserve

Arcserve
Arcserve is a global top 5 data protection vendor with best-in-class solutions that manage, protect, and recover all data workloads, from SMB to enterprise and regardless of location or complexity. A 100% channel-centric organization, Arcserve has a presence in over 150 countries, with 19,000 channel partners and 235,000 customers.
Visit Website
Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
Cohesity

Cohesity

Cohesity
Cohesity delivers a web-scale platform that simplifies data protection, consolidates file and object services, provides instant access to test/dev copies, spans from the edge to the cloud, and performs in-place searches and analytics.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet helps organizations across the public and private sectors protect the systems, data, and services that keep businesses and communities running. From government agencies and schools to enterprises and service providers, leaders rely on Fortinet to secure critical infrastructure, ensure operational continuity, and defend against evolving cyber threats. Our Security Fabric platform unifies networking and security to deliver the visibility, control, and efficiency organizations need to operate confidently, whether virtual, in the cloud, or on-premises.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website
Proofpoint

Proofpoint

Proofpoint
Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website
Tidelift

Tidelift

Tidelift
Tidelift provides a proactive approach to managing open source effectively for application development teams. The Tidelift Subscription can improve the health, security, and resilience of your organization’s open source software supply chain.
Visit Website

BRONZE SPONSORS

ExtraHop

ExtraHop

ExtraHop
ExtraHop delivers enterprise cyber analytics that allow you to quickly investigate threats, ensure the delivery of critical applications, and secure your investment in the cloud.
Visit Website
Pentera

Pentera

Pentera
Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers including their ransomware readiness, unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. In 2020, Pentera was chosen by Gartner as a Cool Vendor in the Security Operations and Threat Intelligence report.
Visit Website

EXHIBITORS & ASSOCIATIONS

7x24 Exchange Oregon & SW Washington

7x24 Exchange Oregon & SW Washington

7x24 Exchange Oregon & SW Washington
The 7x24 Exchange Oregon & SW Washington Chapter provides an open forum for in-region members and member companies to share ideas, challenges, and best practice resolutions to promote growth and success in the Mission Critical and Data Center industries.
Visit Website
ASIS Columbia River

ASIS Columbia River

ASIS Columbia River
ASIS International is THE organization for security professionals. ASIS is dedicated to increasing the effectiveness and productivity of security professionals by developing educational programs and materials that address broad security interests.
Visit Website
HDI Oregon

HDI Oregon

HDI Oregon
HDI is the world’s largest IT service & technical support membership association and the industry’s premier certification and training body. Guided by an international panel of industry experts and practitioners.
Visit Website
IIA Salem

IIA Salem

IIA Salem
We are part of the Global Institute of Internal Auditors, which is an international organization serving as the audit profession’s global voice, recognized authority, acknowledged leader, chief advocate, and principal educator.
Visit Website
InfraGard Oregon

InfraGard Oregon

InfraGard Oregon
InfraGard is an essential part of the FBI's outreach efforts. Infragard allows two-way information sharing about intrusion incidents and system vulnerabilities,provides a channel for the DHS to disseminate analytical threat products to the private sector.
Visit Website
ISSA Eugene

ISSA Eugene

ISSA Eugene
Our mission is to provide ongoing education and collaboration of Security, IT, Auditors, other Professionals and Students to strengthen our Technical Community.
Visit Website
ISSA Portland

ISSA Portland

ISSA Portland
The Information Systems Security Association is a not-for-profit organization of information security professionals. It provides educational forums and peer interaction opportunities that enhance the knowledge and professional growth of its members.
Visit Website
PDXWIT

PDXWIT

PDXWIT
We are a community-based non-profit organization. Our purpose is to strengthen the Portland women in tech community by offering: educational programs, partnerships, mentorships, resources and opportunities.
Visit Website
PMI Portland

PMI Portland

PMI Portland
PMI Portland Chapter is the local Chapter of the Project Management Institute, the leading advocate of project management, worldwide. PMI has over 430,000 project management professional members in 193 countries around the globe.
Visit Website
SIM Portland

SIM Portland

SIM Portland
For over 10 years the Portland Chapter of the Society for Information Management (SIM) has been the meeting place for IT executives, IT consultants, academicians, and sr business executives who play key roles in the use of IT in their organizations.
Visit Website
Technology Association of Oregon

Technology Association of Oregon

Technology Association of Oregon
The Technology Association of Oregon is the largest professional technology association in Oregon and SW Washington. TAO drives economic development by promoting, connecting, and advocating for companies involved in the software and technology industries.
Visit Website

Interested in becoming part of our next Portland event?

CONTACT US FOR INFO

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.