F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Portland 2025

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Portland EVENTS

AT A GLANCE

March 21st, 2025
8:30am – 4:30pm

Oregon Convention Center
Portland Ballroom
777 NE Martin Luther King, Jr. Blvd.
Portland, OR 97232

Directions & Parking

Venue Accessibility

KEYNOTE: [1 CPE] How to Talk to Executives About Technology

  Presented by Dr. Ethan Benatan • Chief Information Officer, TriMet

Seminar Schedule

  • Theater One
  • Theater Two
  • Theater Three
  • Theater Four
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] AI Agents & Automation: How They’re Changing the Way We Work

  Presented by Abram Erickson, Lead Data & AI Engineer • Cerium Networks

AI-powered agents are generating a lot of buzz. But what do they actually do?

In this session, you will see how organizations are starting to use AI-powered agents to solve business challenges and create new opportunities. We'll cover advanced tools like custom GPTs, Copilot Studio, and Azure AI Foundry and see how they can be leveraged to drive AI innovation and streamline workflows. This session offers a deep dive into automation's role in simplifying complex processes, enhancing customer experiences, and improving productivity.

Topics: Artificial Intelligence
10:00 - 10:50 AM

[1 CPE] The Future of AI-Enabled Data Platforms

  Presented by Ian Clatworthy, Global Director, Infrastructure Product Marketing • Hitachi Vantara

Removing the infrastructure silos and administration complexity around your application’s data gives you the flexibility to consume solutions and deliver total data freedom. Join us as we showcase the future of data storage as a single hybrid cloud platform for applications. Allowing you to consume the data services you need, where and when you need it! Offering a single data plane and control plane across block, file, object, and mainframe, with one common experience for administration, analytics, and automation.

Ian comes from a customer background in Formula 1 and World Rallying. Having a deep understanding of technology and its benefits he took his skills into technology sales and marketing with Dell and HDS. Today he leads Product Marketing for data infrastructure technologies at Hitachi Vantara.

Topics: Artificial Intelligence, Data Management
11:00 - 11:50 AM

[1 CPE] AI in Cybersecurity: Unlocking Potential While Managing Risks

  Presented by Johan Bloomhart, Principal Sales Engineer • WatchGuard & BlackPoint IT

Join us for a 50-minute session exploring the evolving role of Artificial Intelligence (AI) in cybersecurity. AI is transforming the way we detect and respond to threats, offering new opportunities to enhance security while also introducing unique challenges. This presentation will provide insights into how AI is shaping the security landscape and practical strategies for leveraging AI effectively to strengthen defenses and mitigate risks.

Artificial Intelligence (AI) is revolutionizing cybersecurity, offering advanced capabilities to detect, prevent, and respond to threats. At the same time, cybercriminals are finding ways to use AI for more sophisticated attacks. In this session, we’ll explore AI’s impact on cybersecurity and discuss responsible ways to harness its potential while addressing emerging challenges.

This session will cover:

  • The evolution of AI and its growing role in business and security.
  • Ways security professionals are using AI to strengthen defenses and respond to threats.
  • The latest tools and best practices for minimizing AI-related risks.

Additionally, we’ll provide guidance on developing AI policies that help organizations maximize efficiency while maintaining strong security measures. Attendees will leave with actionable insights to help them integrate AI safely and effectively into their security strategies.

Topics: Artificial Intelligence, Information Security
1:00 - 1:50 PM

[1 CPE] Architecting a Data-Centric Approach to Zero Trust

  Presented by Aaron Kremer, Technical Solution Specialist • NetApp

As organizations navigate the evolving landscape of virtualization, cloud computing, and AI, they face increasing challenges in securing and managing their data. Security remains a critical foundation, while effective data management and mobility ensure data is accessible and protected across diverse environments. With rising complexity, simplicity becomes key to optimizing operations and accelerating outcomes. This session will explore strategies for balancing security, data management, and efficiency, providing actionable insights to help meet the demands of today's dynamic IT environment.

Topics: Business Continuity / Disaster Recovery, Data Center Technology, Data Storage, Information Security
2:00 - 2:50 PM

[1 CPE] From Back-End to Boardroom: Securing Your Seat at the Table

  Presented by INTERFACE Advisory Council

Decisions are made every day at your organization that will impact all employees. Budgets, policies procedures, and more are discussed in board rooms, on conference calls, or at a staff lunch. Who is a part of these discussions? Are you? So often Information Technology departments are not included in key decisions about the direction of an organization, and they should be.

Join the INTERFACE Advisory Council for an open discussion about securing your “seat at the table.” IT performs so many crucial services that help all aspects of a business, it makes sense that you are offering up the needed insight into technology’s role in key decisions. Join this panel discussion to hear from your peers about how you can accomplish this tough task.

Moderator: Brandon Gatke, AVP of Information Technology and Security, Portland Community College

Panelists:

  • Ed Arib, Technology Manager, Portland Police Bureau
  • Steve Hankel, Vice President of Information Technology, Johanson Transportation Service
  • Brian Hole, Deputy CISO, Legacy Health
  • Jaya Srinivasan, CISO, Director of Cybersecurity, M Financial Group
Topics: Culture, Strategic Management
Dr. Ethan BenatanDr. Ethan BenatanChief Information Officer, TriMet
3:00 - 3:50 PM

[1 CPE] How to Talk to Executives About Technology

  Presented by Dr. Ethan Benatan • Chief Information Officer, TriMet

As IT practitioners and leaders, you have deep knowledge about the benefits, risks, and costs associated with your IT operations. Yet IT is too often seen only as a cost center, as order-takers, or as a bunch of smart people who understand the things that our users see at the Service Desk. How can you increase your impact by helping your boss, their boss, executives, and the CEO understand what you have to offer? In this session, we will learn from real experience and leave with a toolkit that will help you better serve your organization –– and your career.

Dr. Ethan Benatan has led IT departments for over 25 years, spending over 10 of those years on executive teams across four different industries and overseeing IT portfolios worth up to a half-billion dollars. He currently serves as the Executive Director of IT and Chief Information Officer for TriMet, the regional transit authority in Portland Oregon, where he is proud to lead an IT team of over 100 professionals in service to the region.

Dr. Benatan is passionate about aligning IT with business needs and building effective communication between IT and internal customers. He is inspired by human potential and enjoys mentoring and teaching. He is a practiced communicator, facilitator, and trainer with skills in nonviolent communication and mindful compassionate dialog. In his spare time, he loves to nerd out on his hobbies which include billiards, flying, and salsa dancing.

Topics: Culture, Strategic Management
  • Sessions
9:00 - 9:50 AM

[1 CPE] Push Your Vulnerability Management Program Forward

  Presented by Chaney Edwards, Sr Security Solutions Engineer • Rapid7

We will begin focusing on building a framework that we will dive into the elements of in greater detail later in the presentation. These elements will be:

  1. Know your leadership, user base, regulations, and requirements
  2. Building policy and procedures
  3. Scan scheduling, design, and validation
  4. Remediation and exception processes
  5. Validation of program
  6. Flexibility and the OODA loop

We will start by focusing on the importance of knowing your leadership, user base, regulations, and requirements –– and ensuring others know that Leadership and Management buy-in is critical to the success of the program. We will talk about how to interact with your user base and what you should communicate with those individuals. We will also touch on how regulations and business requirements will play a part in your program design as well. Next, we will spend time on building policy and procedures and understanding the hierarchy and differences around Information Security Policy vs. Guidelines vs. Procedures.

From there we will shift gears and focus on scan scheduling, design, and validation of the scans in place. While many feel this is the most important part of a program, getting the data is the least important part of the whole process and we will discuss why that is. We will cover topics including scan frequency, targets, and validation. We will touch on the benefits of tagging, the use of agents, and reporting. The focus will be that there is no "right way" to scan and rather several considerations to guide you to what is right for you and your environment. We will also discuss remediation methods and how to track said remediations. With any remediation process, exceptions will occur, and we will touch on best practices for not only accepting that risk into your environment but curating that list for a continual review.

Finally, we will discuss program validation, flexibility, and the OODA loop (Observer, Orient, Decide, Act) and how where you are on day one in your program will inevitably change over time. For validation we will cover reporting not only to leadership but to internal stakeholders like security and governance programs, but also the user base as well. We will discuss topics requiring your program to be flexible like new assets, mergers and acquisitions, new projects, leadership changes, and more. Leveraging the OODA loop we will discuss processes to help tackle these changes and ensure your program can survive an ever-changing landscape.

The session will then end with a live Q&A to discuss any topics had or to field any thoughts on the matter to garner a collaborative end to the talk and allow for audience participation.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Breaking Down Silos: Unify Assets, Minimize Attack Exposure

  Presented by Mike Brown, Sr Systems Engineer • Axonius

In today’s rapidly evolving security landscape, organizations face the challenge of managing a wide array of tools across endpoints, identities, and networks. While each tool serves a critical purpose, they often operate in isolation, creating silos that obscure visibility and expose vulnerabilities. This session will address how the fragmentation of security systems and data increases attack surfaces and how integrating a unified cyber asset management approach can significantly reduce attack exposure.

Join us as we explore how security professionals can move beyond disconnected tools to leverage a single, comprehensive view of their assets and threat exposures. We’ll highlight practical steps and present a preview of an end-to-end solution designed to break down silos, provide full cyber asset visibility, and enable a more holistic approach to minimizing security risks.

As technology continues to evolve, managing disparate security systems will remain a pressing challenge. This session will offer actionable insights to security professionals looking to streamline their approach and safeguard their organizations from the growing complexities of cyber threats.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] The Modern Kill Chain: How Attacks Have Gone from Months to Minutes

  Presented by Tony Kelly, Sr Manager, Sales Engineering • Lookout

Cloud breaches are now happening in minutes, not months. Threat actors are exploiting the fact that mobile devices are more susceptible to social engineering, enabling them to gain direct access to cloud infrastructure and swiftly compromise data. Join us for this 50-minute presentation to learn:

  • How the traditional cyber kill chain has evolved to exploit mobile users
  • Why attacks utilizing a mobile device are increasing
  • What makes your organization vulnerable to a modern-day attack
  • Why stopping breaches requires the ability to identify anomalous data movements
  • The three key capabilities you need to defend against modern breaches
Topics: Information Security
12:00 - 12:50 PM

[1 CPE] The Decarbonization of the Data Center

  Presented by Ian Clatworthy, Global Director, Infrastructure Product Marketing • Hitachi Vantara

Balancing the need for substantial data infrastructure with more eco-friendly policies should be top of all organizational to-do lists. Rather than a competition between corporations, these initiatives should be focused on the larger benefit of a healthier world. That’s why creating a specific data center decarbonization strategy will be key. This will range from improving the visibility and measurement of power usage, to actually reducing the carbon footprint of each operational layer. But where should organizations begin?

Ian comes from a customer background in Formula 1 and World Rallying. Having a deep understanding of technology and its benefits he took his skills into technology sales and marketing with Dell and HDS. Today he leads Product Marketing for data infrastructure technologies at Hitachi Vantara.

Topics: Data Center Technology, Strategic Management
2:00 - 2:50 PM

[1 CPE] Next-Gen Defense: The Future of Cybersecurity

  Presented by Hubert Ralph Bonnell, CISSP, CCSM – Security Engineer • Check Point

As artificial intelligence (AI) permeates our lives, it's crucial to address the cybersecurity challenges it presents. In this dynamic landscape, AI will be utilized by both attackers and defenders. We will explore the opportunities of leveraging AI to enhance your business and defenses while acknowledging the potential risks. AI-powered attacks, opaque AI systems, and a lack of standardized security practices demand proactive measures, rigorous protocols, and transparent designs to ensure a secure AI ecosystem.

Topics: Artificial Intelligence, Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] Modern Data Center Network Automation

  Presented by Bill Wester, Sr Product Manager  • Juniper Networks

The presentation will focus on Juniper Apstra and Designing Data Centers with Intent. We will discuss the design, deployment, and operation of modern EVPN VXLAN data centers and talk about how machine learning and AI are helping to make data center operations easier for the operators. We hope that the attendees will take away a new appreciation of how modern automation can help solve the hardest data center problems with ease.

Topics: Artificial Intelligence, Data Center Technology
10:00 - 10:50 AM

[1 CPE] Are You AI Ready? Securing GenAI in the Modern Enterprise

  Presented by Structured

This presentation explores the integration and security of Generative AI services such as Microsoft Copilot in the modern enterprise and the important security considerations IT needs to address to ensure the secure and successful adoption of these transformative new technologies.

Topics: Artificial Intelligence
11:00 - 11:50 AM

[1 CPE] Unlock the Future of Secure Workspaces with Prisma Access Browser

  Presented by Palo Alto Networks

As work increasingly moves to the cloud, traditional network perimeters dissolve, and the browser becomes the new frontline for productivity and risk. This presentation explores how Prisma Access Browser is redefining security by shifting focus from network-based controls to the user’s primary workspace: the Browser. We’ll dive into how this solution uniquely protects users and data at the browser level. Join us to understand how a secure, zero-trust approach to browser activity can streamline compliance, enhance user experience, and fortify your security posture without compromising productivity. This session includes a live demo.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Zero Trust in Motion: Securing East/West Traffic to Reduce Risk

  Presented by HPE Aruba Networking

Ransomware and targeted cyber security threats are on the rise. A proactive prevention strategy should use both tried and proven methodologies as well as new and emerging technologies. East West traffic identification and isolation is key in preventing malicious content from spreading, both in the Data Center and at the Campus Edge of the network. We will focus on innovative approaches to address the security compliance, performance, agility, and scalability demands of today’s highly distributed, hybrid, network environments.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Real-Time Threat Mitigation with AI-Driven SASE: A Practical Approach

  Presented by Brian Anderson, Global Field CTO • Cato Networks

In this session, we’ll explore how a converged SASE platform combined with AI and machine learning (ML) enables real-time threat detection and mitigation, transforming network security from a reactive to a proactive model. The focus will be on how AI-driven solutions within the SASE framework can identify, analyze, and neutralize security threats in real time across distributed environments.

Brian Anderson, Global Field CTO at Cato, has over 20 years of experience in technology, working with networks, systems, application development, and security specializing in automation. Brian has worked to architect, attack, integrate, and secure networks and applications for emergency notification systems, government environments, healthcare organizations, transactional and e-commerce, including multi-tier cloud-based solutions, and has had a focus on web, database, and network and infrastructure security for the past 13 years at Imperva.

Topics: Artificial Intelligence, Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] Modernizing Application Delivery with the Enterprise Browser

  Presented by Island & Abnormal

In today's dynamic business environment, organizations are increasingly seeking ways to modernize their application delivery infrastructure. The Enterprise Browser (EB) has emerged as a powerful solution that addresses the evolving needs of enterprises. This presentation explores the key features and benefits of the EB, highlighting how it can transform application delivery for enhanced security, productivity, and user experience while reducing IT infrastructure and support costs.

Topics: Information Security, Infrastructure
10:00 - 10:50 AM

[1 CPE] Demystifying Zero Trust: Simplifying Network Security

  Presented by Tanner Harrison, Systems Engineer • Fortinet

Today's ever-changing threat landscape challenges traditional security models. The emergence of the Zero Trust model represents a transformative approach, reshaping how organizations protect their assets. This presentation aims to demystify Zero Trust, offering a comprehensive understanding that goes beyond buzzwords. We will explore the foundational concepts of Zero Trust, emphasizing the "never trust, always verify" philosophy. By the end of this session, attendees will be equipped with the knowledge to begin their Zero Trust journey, enhancing their security posture, and protecting critical data and systems from modern threats. Whether you are a security professional, IT manager, or organizational leader, this discussion will empower you to take decisive action toward a more secure future.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Building a Fortress: Why Allowlisting Traffic is Key to Secure Networks

  Presented by Charles Killmer, Sr Security Analyst and Solution Architect • FRSecure

In this presentation, we’ll explore the critical role of allowlisting in enhancing network security. By focusing on controlling both ingress and egress traffic, allowlisting ensures that only trusted traffic is permitted, reducing the attack surface and minimizing vulnerabilities. Learn how adopting a comprehensive allowlisting strategy can help build a secure, resilient network fortress, protecting your systems from malicious threats and unauthorized access. Whether you're implementing it for the first time or refining your approach, this session will highlight best practices and common pitfalls.

Topics: Information Security, Infrastructure
1:00 - 1:50 PM

[1 CPE] Tackling Ransomware and Leveraging a Cybersecurity Platform with AI

  Presented by Teddy Nicoghosian, Principal Technical Product Marketing Manager, Network Security • Barracuda & BlackPoint IT

The presentation by Barracuda and BlackPoint IT Services highlights the importance of an end-to-end, proactive security strategy. It details every phase of a ransomware attack—from the initial arrival of a malicious email to the final steps of recovery—demonstrating that a comprehensive understanding of the entire attack lifecycle is essential. This insight allows organizations to design defenses that are not only robust and all-encompassing but also flexible enough to adapt to the constantly evolving threat landscape.

Topics: Artificial Intelligence, Information Security
2:00 - 2:50 PM

[1 CPE] Don’t Build a Fire Department

  Presented by Brian Knopp, Principal Sales Engineer, US • Arctic Wolf

Building and maintaining an internal SOC operation is hard. We’ll discuss why it’s imperative that organizations lean on 3rd party partners to provide 24x7 monitoring across your collective attack surfaces.

Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Richard Appleyard
Director, Information Design & Technology
Oregon State Bar

Ed Arib
Manager, Technology
Portland Police Bureau

John Beal
Privacy Officer
St. Charles Health System

Michael Bray
Chief Information Security Officer
The Vancouver Clinic

Jeff Brewer
Business Information Security Officer
Conduent, Inc.

Brad Buckmaster
Manager, Information Technology
Plaid Pantries, Inc.

Jonathan Burley
Manager, Information Technology
Kell, Alterman & Runstein, LLP

Stephen Fitton
Director, Information Technology
ExamWorks

Greg Funk
Manager, Information Technology
Oregon Child Development Coalition

Juan Gamboa
Manager, Information Technology
Kokusai Semiconductor Equipment Corp

Brandon Gatke
AVP, Information Technology and Security
Portland Community College

Robert Gibson
Chief Technology Officer
Alta Planning + Design

Steve Hankel
Vice President, Information Technology
Johanson Transportation Service

Brian Hole
Deputy CISO
Legacy Health

Bill Hopkins
Manager, Information Technology
City of Keizer, OR

Don Hornschuch
Director, Information Technology
ZRT Laboratory

Syed Hussain
Chief Information Officer
Oregon Lottery

Dan Kutch
Manager, IT Operations
Oregon Catholic Press

Ying Ki Kwong
E-Government Program Manager
OR Office of CIO

Patrick Meaney
Director, Information Technology
Mid-Willamette Valley Community Action

Larry Miller
Chief Information Officer
Taiga Exterior Wood, Inc.

Valerie Moreno
Chief Information and Security Officer
Reed College

Steve Moultrie
Director, Information Technology
BeefNW

Smart Ocholi
Chief, Technical Resources Branch
Engineering Division US Army Corps of Engineers

Jeff Olson
Chief Technology Officer
Legacy Health

Linu Parappilly
Chief Information Officer
Clackamas County, OR

Shane Perry
Information Security and Risk Officer
OR Public Employees Retirement System

Ian Raloff
Sr Applications Systems Engineer
Moda Health

Josh Renoe
Director, Information Technology
The Management Group

Sergey Sergeyev
Vice President, Architecture
Camping World

Jaya Srinivasan
CISO, Director, Cybersecurity
M Financial Group

Nathan Struk
Manager, Technology
Business Valuation Resources

Frank Taylor
Systems Security Engineer
Corpay, Inc.

Marie VerMeer
Director, Global Technology Operations
Columbia Sportswear Company

Gary Vermeulen
Manager, Information Technology
Lacamas Labs

Saby Waraich
Chief Information Officer
Clackamas Community College

John Weaver
Sr Director, Information Technology
nLIGHT Inc.

Scott White
Director, Information Technology
Bridgewell Resources LLC

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

BlackPoint IT

BlackPoint IT

BlackPoint IT
Established in 1977, BlackPoint IT Services is a leading provider of comprehensive IT and Telecom Managed Services, catering to small and medium-sized businesses across the United States. Our commitment to excellence extends globally, with remote services offered internationally for our clients. Our diverse service offerings encompass Carrier, IT Networking, Telecom professional services, and project management, ensuring that our clients receive end-to-end support for their technology needs. At BlackPoint, we are dedicated to delivering tailored solutions that harness the power of current technologies, empowering our clients to achieve their business objectives both today and in the future. With a strong focus on innovation and customer satisfaction, we take pride in our ability to offer a wide range of services while maintaining a high level of expertise. Our team's collaborative approach and unwavering dedication to excellence make BlackPoint the ideal partner for businesses seeking cutting-edge IT and Telecom solutions.
Visit Website
Hitachi Vantara

Hitachi Vantara

Hitachi Vantara
Hitachi Vantara helps enterprises create and derive value from their data. Its solutions include best-in-class data management, IT infrastructure and analytics products, IoT solutions and Smart Spaces technologies for a broad range of industries.
Visit Website
Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

Abnormal

Abnormal

Abnormal
The Abnormal Behavior Platform uses superhuman understanding of human behavior to protect against phishing, social engineering, and account takeovers.
Visit Website
Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
Axonius

Axonius

Axonius
Axonius is an asset inventory management platform that focuses on cybersecurity solutions and policies.
Visit Website
Cato Networks

Cato Networks

Cato Networks
Cato provides the world’s most robust single-vendor SASE platform, converging Cato SD-WAN and a cloud-native security service edge, Cato SSE 360, into a global cloud service. Cato SASE Cloud optimizes and secures application access for all users and locations everywhere.
Visit Website
Cerium Networks

Cerium Networks

Cerium Networks
Cerium is a recognized innovator and leading provider of a full suite of collaboration, contact center, networking, data center, and security solutions. We help medium to large businesses in the Northwest plan for and then realize the positive impact of technology on their business operations, strategies, and user experiences.
Visit Website
Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet helps organizations across the public and private sectors protect the systems, data, and services that keep businesses and communities running. From government agencies and schools to enterprises and service providers, leaders rely on Fortinet to secure critical infrastructure, ensure operational continuity, and defend against evolving cyber threats. Our Security Fabric platform unifies networking and security to deliver the visibility, control, and efficiency organizations need to operate confidently, whether virtual, in the cloud, or on-premises.
Visit Website
FRSecure

FRSecure

FRSecure
FRSecure applies industry standards to assess existing information security programs (administrative, physical and technical security controls), and we develop, implement and manage information security programs tailored to each client’s specific security needs.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
Island

Island

Island
Meet Island, the Enterprise Browser that gives you control over SaaS governance, visibility and productivity. Secure your critical data and apps with Island.
Visit Website
Lookout

Lookout

Lookout
Lookout, Inc. is the data-centric cloud security company that uses a defense-in-depth strategy to address the different stages of a modern cybersecurity attack.
Visit Website
NetApp

NetApp

NetApp
NetApp – Our team is data driven. You have a vision for digital transformation. We help you make it all possible.
Visit Website
Rapid7

Rapid7

Rapid7
Level up SecOps with the only endpoint to cloud, unified cybersecurity platform. Confidently act to prevent breaches with a leading MDR partner.
Visit Website

BRONZE SPONSORS

Adlumin

Adlumin

Adlumin
Adlumin's security and compliance automation platform helps organizations manage evolving threats and cybersecurity compliance requirements.
Visit Website
Arista Networks

Arista Networks

Arista Networks
Arista Networks is an industry leader in data-driven, client-to-cloud networking for large data center, campus, and routing environments. Arista’s award-winning platforms deliver availability, agility, automation, analytics, and security through an advanced network operating stack.
Visit Website
baramundi

baramundi

baramundi
baramundi Software offers efficient, secure, and cross-platform management of workstation environments. With over 20 years of UEM experience across the globe, over 4,000 customers benefit from our intuitive, single-interface platform.
Visit Website
Extreme Networks

Extreme Networks

Extreme Networks
Extreme Networks, Inc. (EXTR) delivers software-driven networking solutions that help IT departments everywhere deliver the ultimate business outcome: stronger connections with customers, partners and employees.
Visit Website
HTG

HTG

HTG
HTG is a premier, single source IT solutions provider specializing in nationwide technology deployments, system conversions/refresh projects, remote site shutdowns and secure asset disposition.
Visit Website
Infoblox

Infoblox

Infoblox
Infoblox unites networking and security to deliver unmatched performance and protection. Trusted by Fortune 100 companies and emerging innovators, we provide real-time visibility and control over who and what connects to your network, so your organization runs faster and stops threats earlier.
Visit Website
Neat

Neat

Neat
Neat designs simple and elegant pioneering video devices for Microsoft Teams and Zoom Rooms, helping make the meeting space experience the best it can be. Continuously pushing boundaries, Neat devices are incredibly easy to install, set up and use.
Visit Website
Pondurance

Pondurance

Pondurance
Pondurance Managed Detection and Response is backed by authentic human intelligence. See how Pondurance MDR can help you manage threats.
Visit Website
Right! Systems

Right! Systems

Right! Systems
Right! Systems, Inc. is an IT management services company that provides business-driven, multi-vendor IT solutions in Network Infrastructure, Virtualization, Storage, Unified Communications, Telepresence, Security, Mobility and Professional Services.
Visit Website
Scale Computing

Scale Computing

Scale Computing
Scale Computing's highly-automated edge infrastructure, virtualization platform, & hyperconverged solutions can handle all of your IT infrastructure needs.
Visit Website
Tech Heads

Tech Heads

Tech Heads
Tech Heads provides IT infrastructure design, procurement, managed services and managed security services, with a 25+ year track record.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website

SPONSOR HIGHLIGHTS

Enjoy enhanced experiences at INTERFACE Portland from these highlighted sponsors.

baramundi

baramundi

baramundi
baramundi Software offers efficient, secure, and cross-platform management of workstation environments. With over 20 years of UEM experience across the globe, over 4,000 customers benefit from our intuitive, single-interface platform.
Visit Website
Hitachi Vantara

Hitachi Vantara

Hitachi Vantara
Hitachi Vantara helps enterprises create and derive value from their data. Its solutions include best-in-class data management, IT infrastructure and analytics products, IoT solutions and Smart Spaces technologies for a broad range of industries.
Visit Website
Netskope

Netskope

Netskope
Netskope, a global SASE leader, helps organizations apply zero trust principles and AI/ML innovations to protect data and defend against cyber threats. The Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Learn how Netskope helps customers be ready for anything on their SASE journey, visit netskope.com.
Visit Website
Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

EXHIBITORS & ASSOCIATIONS

8x8, Inc.

8x8, Inc.

8x8, Inc.
8×8 is transforming the future of business communications as a leading Experience Communications as a Service (XCaaS) provider. 8×8 XCaaS brings together customer and employee experience to deliver business agility. It’s the only integrated platform for contact center, voice, video, chat, and APIs that addresses today’s dynamic, critical workplace requirements. Unlike competitors, the 8×8 Experience Communications Platform enables company-wide collaboration, unified administration, shared integrations, and cross-platform AI and analytics through the industry’s only 99.999% financially back, platform-wide service level agreement (SLA). Unlike multi-vendor environments, 8×8 XCaaS provides platform-wide reliability, lowers cost, boosts employee productivity and customer engagement, and delivers intelligence through AI-powered experiences and insights.
Visit Website
Astound

Astound

Astound
Astound keeps businesses connected with dependable fiber infrastructure and internet solutions backed by award-winning service.
Visit Website
Barracuda

Barracuda

Barracuda
Barracuda Networks is the worldwide leader in Security, Application Delivery and Data Protection Solutions. More than 200,000 global customers trust Barracuda to safeguard their employees, data, and applications from a wide range of threats. Barracuda provides easy, comprehensive and affordable solutions for email protection, application protection, network protection and data protection. We are continually innovating to deliver tomorrow’s security technology, today.
Visit Website
BorderLAN

BorderLAN

BorderLAN
BorderLAN provides Cyber Security defense software and solutions to thousands of organizations, specializing in 24/7 monitoring, Web Filtering, Student Safety, AV, Email Security, Backup, Firewalls, and more...
Visit Website
Case Logic

Case Logic

Case Logic
Since 1984, we have been manufacturing bags and cases that keep you organized and your devices protected while on the go. Although technology has changed over the years, our design philosophy has always remained – create a balance of style, organization and performance to make life easier and more accessible.
Visit Website
CISA

CISA

CISA
CISA is the Nation’s risk advisor, working with partners to defend against today’s threats and collaborating to build more secure and resilient infrastructure for the future.
Visit Website
Cisco

Cisco

Cisco
Cisco is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. Cisco delivers intelligent cybersecurity for the real world.
Visit Website
Converge Technology Solutions

Converge Technology Solutions

Converge Technology Solutions
Converge Technology Solutions Corp. is a North American software-enabled, Hybrid IT Solution Provider focused on delivering industry leading solutions and services. Converge’s regional sales and services organizations deliver advanced analytics, cloud, cybersecurity, and managed services offerings to clients across various industries.
Visit Website
Cradlepoint

Cradlepoint

Cradlepoint
Cradlepoint enables the freedom to connect people, places, and things that drive more experiences, more ways to work, and better business results — anywhere. The company is a pioneer in Wireless WAN, offering advanced 4G and 5G routers and adapters — controlled through Cradlepoint NetCloudTM. Organizations rely on Cradlepoint and its Cellular Intelligence to build a reliable, secure network for fixed and temporary sites, vehicles, IoT devices, and remote employees. Headquartered in Boise, Idaho, Cradlepoint is a subsidiary of Ericsson’s Business Area Enterprise Wireless Solutions division. It has international offices in Asia Pacific, Canada, Europe, India, and Latin America.
Visit Website
DirectDefense

DirectDefense

DirectDefense
DirectDefense provides enterprise risk assessments, penetration testing, ICS/SCADA security services, and 24/7 managed security services for companies of all sizes. Focused on building security resiliency, the firm offers comprehensive security testing services with specialization in application security, vulnerability assessments, penetration testing, and compliance assurance testing.
Visit Website
Ericsson

Ericsson

Ericsson
Ericsson’s enterprise wireless solutions enable organizations to innovate, operate, and grow anywhere — without constraints. Ericsson NetCloud, Cradlepoint routers, and Enterprise 5G solutions provide the flexibility of public and private 5G, with the zero trust security of simplified SASE.
Visit Website
HPE Juniper Networking

HPE Juniper Networking

HPE Juniper Networking
Juniper Networks is now part of HPE. Together, we're building industry-leading, secure, AI-native networks – purpose-built with and for AI. As AI and networking converge, we're driving a bold transformation across enterprises, service providers, and cloud operators.
Visit Website
InfraGard Oregon

InfraGard Oregon

InfraGard Oregon
InfraGard is an essential part of the FBI's outreach efforts. Infragard allows two-way information sharing about intrusion incidents and system vulnerabilities,provides a channel for the DHS to disseminate analytical threat products to the private sector.
Visit Website
Interject

Interject

Interject
INTERJECT makes digital transformation accessible and minimally disruptive—especially when budgets are tight. Boost productivity and drive user adoption by leveraging your existing software and enhancing critical spreadsheets with new data governance features.
Visit Website
ISC2 Oregon

ISC2 Oregon

ISC2 Oregon
Our mission is to advance information security in local communities throughout Oregon by providing our members and other security professionals with the opportunity to share knowledge, grow professionally, educate others, and collaborate on projects.
Visit Website
ISSA Portland

ISSA Portland

ISSA Portland
The Information Systems Security Association is a not-for-profit organization of information security professionals. It provides educational forums and peer interaction opportunities that enhance the knowledge and professional growth of its members.
Visit Website
iT1 Source

iT1 Source

iT1 Source
Since 2003, iT1 Source has provided a wide range of IT solutions –– from big data and communications to online support and virtualization.
Visit Website
MSPAA

MSPAA

MSPAA
The MSP Association of America (MSPAA) has been established with three primary missions, each of which follows a unique trajectory aimed at providing our clients, members, and students with a collaborative and informative pathway towards building a future for technology, business, and education.
Visit Website
N-able

N-able

N-able
N-able is the world’s leading integrated IT Service Management platform provider, helping thousands of IT professionals across the world. N-able is the global market leader in the delivery of integrated cloud-based IT Service Management solutions to Managed Service Providers and end user businesses.
Visit Website
Netop

Netop

Netop
Netop is transforming the secure remote access and control market by reducing downtime, improving reliability, and simplifying the complexity of modern remote device management without compromising security. With more than 40 years of experience supporting over 5 million devices in over 80 countries, Netop is the trusted choice for secure remote control.
Visit Website
Netskope

Netskope

Netskope
Netskope, a global SASE leader, helps organizations apply zero trust principles and AI/ML innovations to protect data and defend against cyber threats. The Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Learn how Netskope helps customers be ready for anything on their SASE journey, visit netskope.com.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website
PMI Portland

PMI Portland

PMI Portland
PMI Portland Chapter is the local Chapter of the Project Management Institute, the leading advocate of project management, worldwide. PMI has over 430,000 project management professional members in 193 countries around the globe.
Visit Website
PNSQC

PNSQC

PNSQC
PNSC is an all-volunteer organization dedicated to bringing Quality Best Practices to anyone and everyone interested in learning. We do this through our annual conference and other satellite events that bring people together to discuss Quality topics.
Visit Website
Radiant Logic

Radiant Logic

Radiant Logic
For over 20 years Radiant Logic has been focused on one core issue: how to unify identity data to radically simplify identity integration and storage, and create tangible business value.
Visit Website
Red Canary

Red Canary

Red Canary
The Red Canary Security Operations Platform, driven by purpose-built technology, security research, and threat intelligence, provides advanced threat detection and response across your entire IT estate to improve your security outcomes.
Visit Website
Red Hat

Red Hat

Red Hat
Red Hat is the world’s leading provider of enterprise open source solutions, including high-performing Linux, cloud, container, and Kubernetes technologies.
Visit Website
Sidechain

Sidechain

Sidechain
At Sidechain, we care about your data protection and IT management needs. We offer a suite of Cybersecurity and IT managed services that focus on taking work off of your plate and leaving it to our team of experts.
Visit Website
SIM Portland

SIM Portland

SIM Portland
For over 10 years the Portland Chapter of the Society for Information Management (SIM) has been the meeting place for IT executives, IT consultants, academicians, and sr business executives who play key roles in the use of IT in their organizations.
Visit Website
Technology Association of Oregon

Technology Association of Oregon

Technology Association of Oregon
The Technology Association of Oregon is the largest professional technology association in Oregon and SW Washington. TAO drives economic development by promoting, connecting, and advocating for companies involved in the software and technology industries.
Visit Website
Thales

Thales

Thales
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks.
Visit Website
Thule

Thule

Thule
For more than 75 years, Thule has been creating solutions to simplify life’s adventures. We are committed to developing smart, stylish products that are environmentally sound, high quality, safe, and easy to use. All so you can bring the things you care most about.
Visit Website
UMBC Training Centers

UMBC Training Centers

UMBC Training Centers
UMBC Training Centers is a premier provider of Artificial Intelligence, IT, Cybersecurity, Software Engineering, Leadership, and Project Management training. We are a non-profit organization owned by the University of Maryland, Baltimore County (UMBC).
Visit Website
WatchGuard

WatchGuard

WatchGuard
For 25 years, WatchGuard Technologies has pioneered easy-to-deploy and easy to manage solutions. With industry-leading network security, secure Wi-Fi, MFA, Endpoint and network intelligence products and services for more than 250,000 companies. In a world where the cybersecurity landscape is constantly evolving, and new threats emerge each day, WatchGuard makes enterprise-grade cybersecurity technology accessible for every company.
Visit Website
WiCyS Oregon

WiCyS Oregon

WiCyS Oregon
Women in CyberSecurity is the premier organization with international reach dedicated to bringing together women in cybersecurity from academia, research and industry to share knowledge, experience, networking and mentoring.
Visit Website
Xiologix

Xiologix

Xiologix
Xiologix is a technology solution provider of business driven multi-vendor IT solutions to customers throughout the US and Canada. They offer a wide variety of hardware and software products from the world's leading IT companies.
Visit Website

Interested in becoming part of our next Portland event?

CONTACT US FOR INFO

Portland

Oregon Convention Center
Portland Ballroom
777 NE Martin Luther King, Jr. Blvd.
Portland, OR 97232

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.