F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Portland 2024 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Portland EVENTS

AT A GLANCE

March 19th, 2024
8:30am – 4:30pm

Oregon Convention Center
Portland Ballroom
777 NE Martin Luther King, Jr. Blvd.
Portland, OR 97232

Directions & Parking

Venue Accessibility

KEYNOTE: [1 CPE] Next Era of Corporate Leadership: The Transformative Role of CIOs

  Presented by Lutz Beck • Chief Information Officer, Daimler Truck North America

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Theater Three
  • Theater Four
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Navigating the Cybersecurity Landscape: Essential Considerations for MDR

  Presented by Wayne Selk, Vice President of Cybersecurity Programs and Executive Director at CompTIA ISAO • ESET

Join Wayne Selk, Vice President of Cybersecurity Programs and Executive Director at CompTIA ISAO, and ESET as they navigate the intricacies of MDR (Managed Detection and Response) services and chart a course for enhanced cybersecurity resilience. Discover the importance of 24/7 service coverage in the face of global threats and the importance of human analysts working alongside your technology stack. Understand how compliance requirements influence vendor selection.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Achieving Your Goals with Hybrid Cloud

  Presented by Chet Sulgrove, Technical Expert, Hybrid Cloud & Converged Infrastructure Healthcare Solutions • Hitachi Vantara

The extension of traditional data center applications to include public cloud has led to a rethinking of how to approach cloud strategies with a common operations model that can scale up and down quickly to take advantage of new business opportunities. As a result, companies are seeking to balance their public and private cloud strategy, aligning to a common Hybrid Cloud Operating Model.

Chet Sulgrove is a seasoned Solutions Specialist with a dynamic career spanning 36 years in the IT industry, with a significant focus on Hybrid Cloud and Converged Infrastructure. Chet's approach is notably holistic and consultative, prioritizing a deep understanding of each client's unique business objectives, challenges, and requirements. His tenure includes more than 10 years at Hitachi Vantara, where he has honed his skills in leveraging business insights, discovery, and competitive analysis. Known for building strong, trust-based relationships, Chet effectively collaborates with executive leaders, stakeholders, technologists, and partners, balancing technical acumen with a keen focus on partnership and customer-centric solutions.

Topics: Data Storage, Infrastructure
11:00 - 11:50 AM

[1 CPE] Implementing Vendor-Agnostic Zero Trust Networking Access

  Presented by Kevin Heide, Director of Enterprise Networking • Cerium Networks

In the realm of cybersecurity, the Zero Trust Networking Access (ZTNA) model has emerged as a paramount strategy for safeguarding digital assets. This presentation focuses on the practical implementation of a vendor-agnostic Zero Trust approach, guided by the standards set by the National Institute of Standards and Technology (NIST) and the Cybersecurity and Infrastructure Security Agency (CISA).

We will explore the fundamental principles of the Zero Trust model, emphasizing its 'never trust, always verify' philosophy. This approach is critical in a landscape where traditional perimeter-based security models fall short against sophisticated cyber threats. The talk will elucidate how a vendor-agnostic ZTNA framework enhances flexibility and interoperability, allowing organizations to integrate the best solutions irrespective of vendor.

Special attention will be given to aligning ZTNA implementations with NIST's guidelines and CISA's recommendations. This alignment ensures that Zero Trust architectures are robust, compliant, and capable of mitigating a wide range of cyber threats. We will review key NIST publications, such as NIST SP 800-207, to demonstrate how they can be practically applied in crafting a Zero Trust strategy.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] AI: Friend or Foe? An Open Discussion With Your Colleagues

  Presented by INTERFACE Advisory Council

Artificial Intelligence has made a mark already and its use will only continue to expand. Are we fully prepared to embrace AI in our workplaces? Viewpoints differ on how widely AI should be used at this point. Commonly used applications and software now include AI capabilities as a part of their standard offerings. How is this governed in your company? Do you even have an AI policy drafted?

Join the INTERFACE Advisory Council for an open discussion on all things AI. We will cover the risks associated with using AI –– and the risk of NOT using it. What knowledge do you need right now? Bring your questions as we explore the starting points that every IT department needs to consider for an effective AI policy.

Artificial Intelligence has made a mark already and its use will only continue to expand. Are we fully prepared to embrace AI in our workplaces? Viewpoints differ on how widely AI should be used at this point. Commonly used applications and software now include AI capabilities as a part of their standard offerings. How is this governed in your company? Do you even have an AI policy drafted?

Join the INTERFACE Advisory Council for an open discussion on all things AI. We will cover the risks associated with using AI –– and the risk of NOT using it. What knowledge do you need right now? Bring your questions as we explore the starting points that every IT department needs to consider for an effective AI policy.

Moderator: Richard Appleyard, Director of Information Design & Technology, Oregon State Bar

Panelists:

  • Ed Arib, Technology Manager, Portland Police Bureau
  • Brandon Gatke, CIO / CISO, Pacific University
  • Steve Hankel, Vice President, Information Technology Johanson Transportation Service
  • Saby Waraich, Chief Information Officer, Clackamas Community College
Topics: Artificial Intelligence
2:00 - 2:50 PM

[1 CPE] Modernizing Your DR Strategies Against Ransomware

  Presented by Eddie Huang, Sr Systems Engineer • Quest Software

Scenarios of data loss, including ransomware attacks, can be crippling with the inability to access data, interruption of business operations, and in some cases, significant cost penalties. Creating a Disaster Recovery plan becomes critical to be prepared for unforeseen risks.

But where do you begin? Join us to better understand the importance of starting from the beginning and ensuring all stakeholders are involved and armed with a solid understanding of Data Protection before problems such as malicious attacks and general system failures impact an organization.

We'll focus on:

  • Best practices to adhere to when creating a DR plan with “recovery” as the focus.
  • The importance of viewing Data Protection from this perspective is to better understand what it means to “protect the backup.”
Topics: Business Continuity / Disaster Recovery
Lutz BeckLutz BeckChief Information Officer, Daimler Truck North America
3:00 - 3:50 PM

[1 CPE] Next Era of Corporate Leadership: The Transformative Role of CIOs

  Presented by Lutz Beck • Chief Information Officer, Daimler Truck North America

In an era where technology underpins every facet of business operations, Chief Information Officers (CIOs) are no longer mere managers of IT infrastructure but pivotal figures leading the change in redefining the organizational landscape. This keynote highlights the evolving role of CIOs as architects of innovation, who through the lens of process re-imaging and strategic foresight, are setting new precedents in business leadership and revenue. By embracing end-to-end process transformation, the next generation of CIOs are not just enhancing operational efficiencies but are at the forefront of driving revenue growth and fostering a culture of holistic strategic thinking.

Lutz Beck, Chief Information Officer at Daimler Truck North America (DTNA), is shaping the future of IT. By directing cultural change through digital activation, his visionary IT strategy, "Building the Intelligent Company," guides digital transformation at DTNA, positioning the organization at the cutting edge of technology. Lutz champions IT Leadership, disruptive ideas, and innovation by re-imagining the way business is done.

Before becoming the CIO at DTNA, Lutz was the CIO at Daimler Truck Asia (Mitsubishi Fuso in Japan and Bharat Benz in India). As CIO, Lutz was responsible for the overarching IT technology strategy, ConnectX. Under his leadership, connectivity and big data analytics for DA were initiated, developed, and successfully established.

Before DTA, Lutz held various management positions at Daimler in Germany.

Topics: Culture, Strategic Management
  • Sessions
9:00 - 9:50 AM

[1 CPE] Case Study: Modernizing Authentication in the Enterprise

  Presented by Pete Hernandez, Principal Security Architect • Atmosera

Join us as we discuss the challenges a global manufacturing company faced 2-years after adopting a modern authentication platform. We’ll cover how to approach adaptive access correctly, based on user context. We’ll cover how sprawling App registrations and misshapen service accounts were brought under control. Also, we’ll talk about how to govern identities correctly using Separation of Duties. Finally, we’ll review the real-world journey of adopting a Zero Trust Model for dynamic environments and how ZT empowers enterprises to remain resilient in the face of today's threats.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Zero Trust Microsegmentation: It’s Easier Than You Think

  Presented by Tony Steffe, Sr Systems Engineer, CISSP • Illumio

Regardless of the sophistication of the ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you with simple steps to get started that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

Tony is a knowledgeable technical professional with 20+ years of experience developing, selling, and integrating technology for enterprise customers. He is effective in sales engineering, Internet security, project management, computer networking, and interpersonal relations. Exceptional at managing the personal and technical challenges that arise from building something new, Tony has successfully built out several high-impact IT projects.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Intelligent SSE: Secure Everything from Anywhere

  Presented by Matt Senechal, Regional Sales Manager • Netskope

This session will provide a technical overview of Security Service Edge (SSE), focused on the following topics:

  • Unintentional or unapproved data movement
  • Data protection for internal and external threats
  • Conditional and contextual access to safely enable cloud & SaaS applications
  • Protection from cloud-enabled SaaS and web threats
  • Work from anywhere with a secure, fast experience

You will walk away understanding the fundamentals of SSE and how it will benefit your business.

Topics: Data Management, Information Security, Infrastructure
12:00 - 12:50 PM

[1 CPE] Data Security: Challenge Met Through Immutable Storage

  Presented by Isaac Story, Data Intelligence Sales Specialist • Hitachi Vantara

In a world with increasingly complex attacks being carried out on enterprise data assets, immutable storage is becoming a powerful defense against data breaches and Ransomware. Learn how customers are using this age-old technology that has come of age with more adaptable access options and increasing application integrations.

Isaac Story is a Data Intelligence Specialist with Hitachi Vantara. He has over 23 years of experience in IT infrastructure with a specific focus on advanced and emerging storage technologies including object storage and high-speed parallel file systems.

Topics: Data Storage, Information Security
1:00 - 1:50 PM

[1 CPE] 2024 Global CISO Predictions

  Presented by Greg Pepper, Security Architect • Check Point

Join this session to leverage strategic, evidence-backed insights from top voices in the field. Tap into the expertise of seasoned professionals to untangle complexity and stay ahead of the curve. In this must-attend CISO session, discover how to keep up with artificial intelligence trends, cloud security challenges, and cyber security solutions that can cancel attacks faster than you can say ‘distinctive cyber-readiness’.

Greg Pepper, Security Architect, will share reflections on 2023 and identify a variety of key cyber threats and cybercriminal tactics that could influence your cybersecurity plans in the year ahead.

Gregory (Greg) Pepper is a Senior Architect and a Check Point Evangelist. Greg has been an IT professional for 20+ years with expertise in Security, Networking & Cloud Computing. At Check Point, Greg’s main focus is to work with customers, partners and Check Point employees to help plan, design and implement security solutions across their networks, clouds, endpoints & mobile devices. Greg has been involved with a significant number of our of major cloud migrations and transformation across some of the largest Enterprise, Commercial and Public Sector Customers. Prior to Check Point, Greg has worked at well-known companies like Sony, Cisco and Price Waterhouse Coopers and Organic. Greg holds a Bachelor of Business Administration from Emory University – Class of 1998.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Addressing Cybersecurity Concerns for Critical Infrastructure Organizations

  Presented by Leslie Ann Kainoa, Oregon Cybersecurity State Coordinator • CISA

In this session, we will address the current cybersecurity threats and critical infrastructure stakeholder concerns. We will focus on under-discussed topics, including how to address resource constraints and organizational dependencies. We will also review CISA’s recommended best practices and offer guidance for how all critical infrastructure organizations can effectively leverage CISA resources.

Leslie Ann Kainoa is the Oregon Cybersecurity State Coordinator for the Cybersecurity and Infrastructure Security Agency (CISA), Region 10. In her current role, Leslie provides cybersecurity assistance and support to public and private Critical Infrastructure sectors throughout the State. She is focused on working with these organizations to improve cybersecurity and critical infrastructure resilience.

Topics: Information Security, Infrastructure, Strategic Management
  • Sessions
9:00 - 9:50 AM

[1 CPE] A Review of FRSecure’s 2023 Annual Information Security Report

  Presented by Dave Tuckman, Information Security Consultant • FRSecure

FRSecure (an Information Security company located in Edina, MN) took the results of +/- 400 Validated Information Security Assessments and 55 Incident Response Engagements conducted in 2022 and created an anonymized report from the data called: The State of Information Security. Full details and access to the report are available here: https://frsecure.com/2023-annual-infosec-report/

In this presentation, FRSecure Information Security Consultant Dave Tuckman will highlight key findings in the report, and what we can learn from it.

Understand how you can mitigate risk going forward to protect your business and clients in an ever-changing threat landscape. Dave will provide additional perspective on how you can leverage this information for a better understanding of your third-party (supply, vendor, contractor) relationships.

Topics include:

  • FRSecure’s Annual State of InfoSec Report, informed by over 400 validated security assessments
  • Where organizations are getting it right vs. falling behind
  • How you can use this report to inform your own business’s security decisions
  • How you can use this report to inform your business’s Third-Party Risk Management
Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Cybersecurity for the SMB: What You Need to Know to Counter Today’s Threats

  Presented by Andrew Hutchison, Director of Service Delivery • BlackPoint IT

This session will provide overview and trends of Cybersecurity for SMB

  • Cybersecurity Landscape 2024
  • Response and Recovery

Understand your options and how to keep your organization secure!

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Global Insights on Identity Security Maturity: Why it Matters? Why Now?

  Presented by Brian Roberts, Sr Solutions Engineer • CyberArk

In our global survey of 1,500 identity-related security experts, we found only 9% of organizations have the highest level of maturity. These Transformative organizations have the most mature identity security programs as they strategically focus on four key tenets: tools, integration, automation, and continuous threat detection & response. As a result, these organizations significantly outperform their competition in driving business outcomes and reducing risk. Learn how you can mature your identity security program because the future of security starts with identity.

Key Session Takeaways:

  • Top challenges for identity security
  • The four tenets of identity security
  • How to take a holistic approach to identity security
  • Key considerations in evaluating identity security providers

Brian Roberts is a motivated, technically-minded individual with 12 years of solutions engineering experience ranging from backup and disaster recovery to identity security. He primarily focuses on Privilege Access Management and Least Privilege Enforcement with self-hosted and cloud assets.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Unveiling the Power of Zero Trust: Unlocking Business Value & Building Resilience

  Presented by Optiv & Akamai

Join us for an enlightening fireside chat as we delve into the realm of Zero Trust security architecture. Discover how Zero Trust principles can revolutionize your organization's cybersecurity approach, mitigate risks, and drive tangible business outcomes. Our expert panelists will demystify Zero Trust, offering actionable insights and strategies to harness its full potential in today's dynamic threat landscape.

Speakers:

  • Dan Brown, Technical Director, Optiv
  • Umar Carter, Sr Security Advisor, Optiv
  • Tony Lauro, Director of Security Technology & Strategy, Akamai
Topics: Data Management, Data Storage, Information Security, Strategic Management
2:00 - 2:50 PM

[1 CPE] Work Smarter, Not Harder: How to Choose the Best Partners

  Presented by Zane Smith, Principle Solutions Architect • Tech Heads

Want to know the secret to gaining expertise in cybersecurity, AI, digital transformation, cloud migration, and more? The secret is: you don’t have to become an expert in these areas - you just have to become an expert in picking the right partner. Learn from an IT Industry veteran and CISSP-certified cybersecurity expert about the top 5 criteria for selecting the right external partner, ensuring your team focuses on innovation, not information overload or fire-fighting. Elevate your strategy, empower your team, and don't miss out on this game-changing session - your IT leadership success starts here!

Topics: Information Security, Strategic Management
  • IT Solutions Theater Sponsored by Structured
9:00 - 9:50 AM

[1 CPE] AI-Driven Networking

  Presented by Juniper Networks & Structured

Every connection counts. Nearly every vital experience in modern-day life requires a strong network connection. At Juniper, we believe that connectivity is not the same as experiencing a great connection. When you shift from simply measuring connectivity to focusing on the experience of the end-to-end connection – everything changes. Join us to learn how Juniper is revolutionizing networking with an experience-first approach driven by the industry’s only AI-Native Platform.

Topics: Artificial Intelligence
10:00 - 10:50 AM

[1 CPE] Securing East/West Traffic in a Modern Data Center

  Presented by HPE Aruba Networking & Structured

While data center networking has evolved over the past decade to address the volume and velocity of emerging application architectures, security and services architectures have not kept up with the explosion of East/West traffic. These services have all been different appliances or VMs bolted onto the network, leading to many challenges for IT teams including complexity, different vendors to manage, and network chokepoints. With a new category of data center switches powered by embedded DPU technology, we can run stateful services such as firewall, telemetry, and encryption directly on the switches themselves. With these stateful services delivered at wire-rate on every port, we can solve some of the biggest challenges with East/West traffic such a scale, performance, micro-segmentation, visibility, and automation.

Topics: Data Center Technology
11:00 - 11:50 AM

[1 CPE] Modern Cloud Security Beyond the Buzzwords

  Presented by Palo Alto Networks & Structured

Get up to date with the rapidly evolving world of cloud and container security without the buzzword bingo. In a sea of acronyms (CNAPP! CSPM! CIEM!) it can be hard to know what it all means and what really matters. And because of the rapid pace of advancement, what was state of the art a couple of years ago underperforms today. We will catch you up and as a bonus, we'll also talk about the opportunity to improve security while reducing costs (that's right, reducing costs) through proactive and preventative collaboration with your dev teams.

Topics: Data Storage, Information Security
1:00 - 1:50 PM

[1 CPE] Cybersecurity and Compliance For 2024

  Presented by Rob Wayt, Director of Governance, Risk, and Compliance • Structured

The cybersecurity regulatory compliance landscape has never been more complicated, and this presentation will provide information and updates to CMMC, GLBA, PCI, TSA, generative AI and security best practices. This discussion will focus on security solutions to these challenges, including penetration testing and zero trust implementations. Rob Wayt, Director of Governance, Risk, and Compliance at Structured will be the presenter.

Topics: Artificial Intelligence, Information Security
2:00 - 2:50 PM

[1 CPE] A Pragmatic Approach to Implementing a Cloud Service Operating Model

  Presented by Tristan Todd, Solutions Architect • Pure Storage & Structured

For almost 10 years now, future-focused datacenter teams have been trying to evolve to a more cloud-like operating model. Some of us have succeeded, some of us have failed. During this fun-filled, example-heavy session, Solutions Architect Tristan Todd will share patterns of failure, patterns of success, some practical examples, and recipes for success on how organizations have succeeded in realizing success in adapting to a cloud ops model. This will be a fun, interactive, high-energy session that you won't want to miss!

Topics: Data Center Technology, Data Storage

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Richard Appleyard
Director, Information Design & Technology
Oregon State Bar

Ed Arib
Manager, Technology
Portland Police Bureau

John Beal
Privacy Officer
St. Charles Health System

Nathan Beil
Director, Information Systems
RISE Partnership

Michael Bray
Chief Information Security Officer
The Vancouver Clinic

Jeff Brewer
Business Information Security Officer
Conduent, Inc.

Brad Buckmaster
Manager, Information Technology
Plaid Pantries, Inc.

Farah Daher
IT Manager, System Administrator
Portland Community College

Stephen Fitton
Sr Director, Information Technology
AllMed Healthcare Management

Greg Funk
Manager, Information Technology
Oregon Child Development Coalition

Juan Gamboa
Manager, Information Technology
Kokusai Semiconductor Equipment Corp

Brandon Gatke
CIO / CISO
Pacific University

Robert Gibson
Chief Technology Officer
Alta Planning + Design

Steve Hankel
Vice President, Information Technology
Johanson Transportation Service

Bob Hestand
Chief Information Officer
Relay Resources

Brian Hole
Deputy CISO
Legacy Health

Bill Hopkins
Manager, Information Technology
City of Keizer, OR

Syed Hussain
Chief Information Officer
Oregon Lottery

Leslie Kainoa
Cybersecurity State Coordinator
CISA

Ying Ki Kwong
E-Government Program Manager
OR Office of the State CIO

Patrick Meaney
Director, Information Technology
Mid-Willamette Valley Community Action

Larry Miller
Chief Information Officer
Taiga Exterior Wood, Inc.

Valerie Moreno
Chief Information Officer
Reed College

Steve Moultrie
Director, Information Technology
BeefNW

Smart Ocholi
Chief, Technical Resources Branch
US Army Corps of Engineers, Engineering Division

Christopher Paidhrin
Chief Information Security Officer
City of Portland, OR

Linu Parappilly
Chief Information Officer
Clackamas County, OR

Shane Perry
Information Security and Risk Officer
OR Public Employees Retirement System

Ian Raloff
Sr Applications Systems Engineer
Moda Health

Josh Renoe
Director, Information Technology
The Management Group

Sergey Sergeyev
Vice President, Architecture
Camping World

Nathan Struk
Manager, Information Technology
Business Valuation Resources

Frank Taylor
Systems Security Engineer
Corpay, Inc.

Marie VerMeer
Director, Technology Services Excellence
Columbia Sportswear Company

Saby Waraich
Chief Information Officer
Clackamas Community College

John Weaver
Sr Manager, IT Infrastructure & Security
Benchmade, Inc.

Ron White
IT Programs Administrator
C-Tran

Scott White
Director, Information Technology
Bridgewell Resources LLC

Dan Whitinger
Sr Director, Technology & CISO
OSU Foundation

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Hitachi Vantara

Hitachi Vantara

Hitachi Vantara
Hitachi Vantara helps enterprises create and derive value from their data. Its solutions include best-in-class data management, IT infrastructure and analytics products, IoT solutions and Smart Spaces technologies for a broad range of industries.
Visit Website
Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

Atmosera

Atmosera

Atmosera
Atmosera is a leading provider of business-class cloud solutions, providing Azure-managed cloud services for public, hybrid, and private clouds.
Visit Website
BlackPoint IT

BlackPoint IT

BlackPoint IT
Established in 1977, BlackPoint IT Services is a leading provider of comprehensive IT and Telecom Managed Services, catering to small and medium-sized businesses across the United States. Our commitment to excellence extends globally, with remote services offered internationally for our clients. Our diverse service offerings encompass Carrier, IT Networking, Telecom professional services, and project management, ensuring that our clients receive end-to-end support for their technology needs. At BlackPoint, we are dedicated to delivering tailored solutions that harness the power of current technologies, empowering our clients to achieve their business objectives both today and in the future. With a strong focus on innovation and customer satisfaction, we take pride in our ability to offer a wide range of services while maintaining a high level of expertise. Our team's collaborative approach and unwavering dedication to excellence make BlackPoint the ideal partner for businesses seeking cutting-edge IT and Telecom solutions.
Visit Website
Cerium Networks

Cerium Networks

Cerium Networks
Cerium is a recognized innovator and leading provider of a full suite of collaboration, contact center, networking, data center, and security solutions. We help medium to large businesses in the Northwest plan for and then realize the positive impact of technology on their business operations, strategies, and user experiences.
Visit Website
Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
CyberArk

CyberArk

CyberArk
Get the most complete Identity Security and Access Management Solutions that enable secure access across any device, anywhere, at just the right time.
Visit Website
ESET

ESET

ESET
For more than 30 years, ESET® has been developing industry-leading IT security software and services to protect businesses, critical infrastructure, and consumers worldwide.
Visit Website
FRSecure

FRSecure

FRSecure
FRSecure applies industry standards to assess existing information security programs (administrative, physical and technical security controls), and we develop, implement and manage information security programs tailored to each client’s specific security needs.
Visit Website
Illumio

Illumio

Illumio
Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes how workloads and devices are communicating, creates granular segmentation policies which only allow necessary communication, and automatically isolates ransomware and breaches. Assume breach. Minimize impact. Increase resilience.
Visit Website
Netskope

Netskope

Netskope
Netskope, a global SASE leader, helps organizations apply zero trust principles and AI/ML innovations to protect data and defend against cyber threats. The Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Learn how Netskope helps customers be ready for anything on their SASE journey, visit netskope.com.
Visit Website
Optiv

Optiv

Optiv
Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential.
Visit Website
Quest Software

Quest Software

Quest Software
At Quest, we solve complex problems with simple solutions. Our philosophy is focused on great products, great service and being simple to do business with. We deliver technology that eliminates the need to choose between efficiency and effectiveness.
Visit Website
Tech Heads

Tech Heads

Tech Heads
Tech Heads provides IT infrastructure design, procurement, managed services and managed security services, with a 25+ year track record.
Visit Website

BRONZE SPONSORS

Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
Arista Networks

Arista Networks

Arista Networks
Arista Networks is an industry leader in data-driven, client-to-cloud networking for large data center, campus, and routing environments. Arista’s award-winning platforms deliver availability, agility, automation, analytics, and security through an advanced network operating stack.
Visit Website
baramundi

baramundi

baramundi
baramundi Software offers efficient, secure, and cross-platform management of workstation environments. With over 20 years of UEM experience across the globe, over 4,000 customers benefit from our intuitive, single-interface platform.
Visit Website
C1

C1

C1
C1 is the premier IP-enabled, services-led, customer experience solutions provider. Over 10,000 customers use us to help them build meaningful connections.
Visit Website
Extreme Networks

Extreme Networks

Extreme Networks
Extreme Networks, Inc. (EXTR) delivers software-driven networking solutions that help IT departments everywhere deliver the ultimate business outcome: stronger connections with customers, partners and employees.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface & the power to take on the ever-increasing performance requirements of the borderless network – today and into the future.
Visit Website
Infoblox

Infoblox

Infoblox
Infoblox unites networking and security to deliver unmatched performance and protection. Trusted by Fortune 100 companies and emerging innovators, we provide real-time visibility and control over who and what connects to your network, so your organization runs faster and stops threats earlier.
Visit Website
IVOXY Consulting

IVOXY Consulting

IVOXY Consulting
Since 2006 IVOXY has been delivering right-sized IT solutions & services throughout the Greater Pacific Northwest. We partner with customers throughout all phases of deploying innovative data availability technologies spanning virtualization, networking, storage, automation, security, data protection, cloud, and beyond.
Visit Website
Keysight

Keysight

Keysight
Keysight delivers advanced visibility and validation solutions to connect and secure the world.  Visibility solutions (network packet brokers, taps and CloudLens) eliminate security blind spots in hybrid networks. Threat Simulator continuously validates enterprises’ security architectures to ensure they are working as defined to detect and stop threats.
Visit Website
Right! Systems

Right! Systems

Right! Systems
Right! Systems, Inc. is an IT management services company that provides business-driven, multi-vendor IT solutions in Network Infrastructure, Virtualization, Storage, Unified Communications, Telepresence, Security, Mobility and Professional Services.
Visit Website
VLCM

VLCM

VLCM
VLCM has been in business for over thirty years, and in that time, we’ve helped thousands of customers throughout the Rocky Mountain West find the proper solutions for their IT needs.
Visit Website

EXHIBITORS & ASSOCIATIONS

7x24 Exchange Oregon & SW Washington

7x24 Exchange Oregon & SW Washington

7x24 Exchange Oregon & SW Washington
The 7x24 Exchange Oregon & SW Washington Chapter provides an open forum for in-region members and member companies to share ideas, challenges, and best practice resolutions to promote growth and success in the Mission Critical and Data Center industries.
Visit Website
Adlumin

Adlumin

Adlumin
Adlumin's security and compliance automation platform helps organizations manage evolving threats and cybersecurity compliance requirements.
Visit Website
AHEAD

AHEAD

AHEAD
AHEAD accelerates the impact of technology on clients by engineering customized data, developer, and infrastructure platforms that improve IT operations.
Visit Website
Akamai

Akamai

Akamai
Akamai is the leading content delivery network (CDN) services provider for media and software delivery, and cloud security solutions.
Visit Website
Akeyless

Akeyless

Akeyless
Akeyless Vault secures IT and DevOps resources, credentials, and access with advanced secrets vault management in hybrid and legacy environments.
Visit Website
Arcserve

Arcserve

Arcserve
Arcserve is a global top 5 data protection vendor with best-in-class solutions that manage, protect, and recover all data workloads, from SMB to enterprise and regardless of location or complexity. A 100% channel-centric organization, Arcserve has a presence in over 150 countries, with 19,000 channel partners and 235,000 customers.
Visit Website
Barracuda

Barracuda

Barracuda
Barracuda Networks is the worldwide leader in Security, Application Delivery and Data Protection Solutions. More than 200,000 global customers trust Barracuda to safeguard their employees, data, and applications from a wide range of threats. Barracuda provides easy, comprehensive and affordable solutions for email protection, application protection, network protection and data protection. We are continually innovating to deliver tomorrow’s security technology, today.
Visit Website
BorderLAN

BorderLAN

BorderLAN
BorderLAN provides Cyber Security defense software and solutions to thousands of organizations, specializing in 24/7 monitoring, Web Filtering, Student Safety, AV, Email Security, Backup, Firewalls, and more...
Visit Website
CDW

CDW

CDW
With full-stack expertise, CDW helps you design, orchestrate and manage technologies that drive business success.
Visit Website
CISA

CISA

CISA
CISA is the Nation’s risk advisor, working with partners to defend against today’s threats and collaborating to build more secure and resilient infrastructure for the future.
Visit Website
CompuNet

CompuNet

CompuNet
CompuNet is a leading U.S. information technology partner, headquartered in Boise, Idaho. The firm specializes in consultation, design and implementation services specifically tailored to solve business problems. With a best-in-class engineering staff and approach, CompuNet focuses on building lasting relationships that prioritize client satisfaction over sales through every step of the journey.
Visit Website
Dell

Dell

Dell
Dell Technologies (NYSE:DELL) helps organizations and individuals build their digital future and transform how they work, live and play. The company provides customers with the industry’s broadest and most innovative technology and services portfolio for the data era.
Visit Website
ExaGrid

ExaGrid

ExaGrid
ExaGrid offers the only disk-based backup appliance with data deduplication purpose-built for backup that leverages a unique architecture optimized for performance, scalability and price.
Visit Website
GCSIT

GCSIT

GCSIT
GCSIT is a different kind of engineering firm. We act as your personal technology optimization team to create and maintain custom-built, agile infrastructure. We help you transition to the right technology solutions to better handle complex and dynamic challenges.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
HPE Juniper Networking

HPE Juniper Networking

HPE Juniper Networking
Juniper Networks is now part of HPE. Together, we're building industry-leading, secure, AI-native networks – purpose-built with and for AI. As AI and networking converge, we're driving a bold transformation across enterprises, service providers, and cloud operators.
Visit Website
Infinidat

Infinidat

Infinidat
Empower data-driven competitive advantage at multi-petabyte scale. Infinidat delivers market-leading storage solutions that impact top- and bottom-line value for customers who depend on data at petabyte scale to create competitive advantage.
Visit Website
InfraGard Oregon

InfraGard Oregon

InfraGard Oregon
InfraGard is an essential part of the FBI's outreach efforts. Infragard allows two-way information sharing about intrusion incidents and system vulnerabilities,provides a channel for the DHS to disseminate analytical threat products to the private sector.
Visit Website
ISC2 Oregon

ISC2 Oregon

ISC2 Oregon
Our mission is to advance information security in local communities throughout Oregon by providing our members and other security professionals with the opportunity to share knowledge, grow professionally, educate others, and collaborate on projects.
Visit Website
ISSA Portland

ISSA Portland

ISSA Portland
The Information Systems Security Association is a not-for-profit organization of information security professionals. It provides educational forums and peer interaction opportunities that enhance the knowledge and professional growth of its members.
Visit Website
iT1 Source

iT1 Source

iT1 Source
Since 2003, iT1 Source has provided a wide range of IT solutions –– from big data and communications to online support and virtualization.
Visit Website
Kelley Create

Kelley Create

Kelley Create
Our mission is to create strategic advantages designed to help our partners grow their businesses. We’ve built a team of in-house technology experts tasked to use a consultative approach to assess unique business needs and offer creative, tailor-made solutions. We specialize in cloud & IT services, security solutions, automation solutions, printing and sending solutions.
Visit Website
Keyfactor

Keyfactor

Keyfactor
Protect every device and workload with the most trusted PKI and machine identity management platform — Keyfactor.
Visit Website
MSPAA

MSPAA

MSPAA
The MSP Association of America (MSPAA) has been established with three primary missions, each of which follows a unique trajectory aimed at providing our clients, members, and students with a collaborative and informative pathway towards building a future for technology, business, and education.
Visit Website
NetApp

NetApp

NetApp
NetApp – Our team is data driven. You have a vision for digital transformation. We help you make it all possible.
Visit Website
NETSCOUT

NETSCOUT

NETSCOUT
The complexity of our connected world is soaring at rates never before seen, creating problems nearly impossible to find. As Guardians of the Connected World, it is our collective mission to secure and assure the performance of our digital ecosystems - across any application, any cloud, any data center. Our patented Smart Data technology and continuous monitoring was engineered to penetrate the countless layers of services, applications, and hybrid cloud servers that comprise your digital architectures. Identify problems with precision and solve them with confidence.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website
PMI Portland

PMI Portland

PMI Portland
PMI Portland Chapter is the local Chapter of the Project Management Institute, the leading advocate of project management, worldwide. PMI has over 430,000 project management professional members in 193 countries around the globe.
Visit Website
Pure Storage

Pure Storage

Pure Storage
Pure Storage uncomplicates data storage, delivering a cloud experience that empowers organizations to maximize their data while reducing the complexity and expense of managing the infrastructure behind it. With certified customer satisfaction in the top 1% of B2B companies, Pure's customers are among the happiest in the world.
Visit Website
Rhombus

Rhombus

Rhombus
At Rhombus, relationships are at the heart of what we do. No matter how big or small your company is, our mission is to build a true partnership and provide simple smart, and powerful solutions that fit your unique security needs.
Visit Website
Secure Smart Office

Secure Smart Office

Secure Smart Office
Secure, Smart Office is a San Diego-based Secured IT company with decades of combined experience in security & IT focused on protecting small and mid-size organizations of our community. We are a proud provider of ESET, industry-leading IT security products from endpoint and mobile security, encryption, two-factor authentication to cybersecurity awareness training.
Visit Website
ServiceNow

ServiceNow

ServiceNow
ServiceNow is changing the way people work. ServiceNow provides service management for every department in the enterprise including IT, human resources, facilities, field service and more.
Visit Website
SIM Portland

SIM Portland

SIM Portland
For over 10 years the Portland Chapter of the Society for Information Management (SIM) has been the meeting place for IT executives, IT consultants, academicians, and sr business executives who play key roles in the use of IT in their organizations.
Visit Website
Technology Association of Oregon

Technology Association of Oregon

Technology Association of Oregon
The Technology Association of Oregon is the largest professional technology association in Oregon and SW Washington. TAO drives economic development by promoting, connecting, and advocating for companies involved in the software and technology industries.
Visit Website
Thales

Thales

Thales
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website
Velox Systems

Velox Systems

Velox Systems
Velox Systems is a business to business IT service company. We offer peerless IT support to increase profitability for your business in Bend, Oregon and beyond.
Visit Website
Xiologix

Xiologix

Xiologix
Xiologix is a technology solution provider of business driven multi-vendor IT solutions to customers throughout the US and Canada. They offer a wide variety of hardware and software products from the world's leading IT companies.
Visit Website
Zscaler

Zscaler

Zscaler
As a leader in Gartner’s Magic Quadrant, Zscaler enforces business policy, mitigates risk and provides twice the functionality at a fraction of the cost of current solutions, utilizing a multi-tenant, globally-deployed infrastructure.
Visit Website

Interested in becoming part of our next Portland event?

CONTACT US FOR INFO

Portland

Oregon Convention Center
Portland Ballroom
777 NE Martin Luther King, Jr. Blvd.
Portland, OR 97232

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.