F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Virtual Phoenix 2020 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

September 25th, 2020
8:30am – 4:30pm

Virtual Conference
Multi-track seminars with Q&A
1-on-1 chat and networking
Hourly prize drawings

KEYNOTE: Digital Transformation: The ASU University Technology Office Story

  Presented by Chris Richardson • Deputy CIO of Development, Mobility, and Smart Cities • ASU

Seminar Schedule

  • Theater One
  • Theater Two
  • Theater Three
  • Theater Four
  • Sessions
  • Keynote
9:00 - 9:50 AM

Cyber AI and Geopolitics: Managing Tomorrow’s Cyber Risk

  Presented by Darktrace

Against a backdrop of escalating geopolitical tensions and an ever-evolving threat landscape, the risk of cyber-attacks to governments and the private sector alike has never been higher. Join Darktrace’s Director of Strategic Threat, Marcus Fowler, and Americas CISO, JR Tietsort to discuss this new era of cyber-threat and how Cyber AI can help defenders regain the upper hand.

This speaking session will include a Q&A with our experts, and explore:

  • How nation-state attacks are changing
  • How organizations can respond to the classic balance of security and productivity
  • How organizational maturity in risk management is maintained whilst ensuring cyber defense

Topics: Information Security
10:00 - 10:50 AM

First Quarter of Containment

  Presented by Malwarebytes

All of us are living in the new Work from Home normal caused by the rapid transmission and spread of COVID-19. While people everywhere have been worried about stopping the spread of COVID, malicious threats have not only continued to propagate but they have exploded in new and interesting ways. During this presentation we will review some of the more creative ways hackers have targeted business and individuals during the age of Work from Home and some ways to protect yourself from them.

Topics: Information Security
11:00 - 11:50 AM

How Application Security Can Help You

  Presented by Trend Micro

With an ever-changing cloud landscape, securing your applications has become a layered approach. When cloud evolution first started, putting your data in the cloud did not seem secure. Now we have redundant and backup data stored around the world. Applications access this data from many different infrastructures and with serverless as the next frontier, developers don't need to spin up their own infrastructure. Securing these applications is challenging from an IT perspective, especially when there is no visibility into developer code.

In this session, we'll be discussing the cloud road map and how to secure applications to benefit both the developers and IT professionals.

Topics: Data Storage, Information Security
1:00 - 1:50 PM

Unified Endpoint Management

  Presented by Quest Software

This presentation highlights the reasons and need for Unified Endpoint Management in your business strategy. This presentation’s sole purpose is to educate C-level and system administrators of the need for UEM as well as what aspects are important. One of the problems with endpoint management today is the proliferation of endpoints. During this global health crisis especially, we are seeing a large work-from-home movement in businesses all over the world. In order to combat this issue, you must have an endpoint management strategy that works not only on the network but off of it as well.

Topics: Infrastructure, Strategic Management
2:00 - 2:50 PM

Ransomware Protection Doesn’t Have to Break the Bank

  Presented by StorageCraft

Ransomware attacks have increased over 130% since the COVID crisis. Everyone is a target and even those with preventative measures in place are at risk. We will review some of the latest attacks and offer best practices in how to protect your organization without increasing budgets.

Topics: Data Storage
Chris RichardsonChris RichardsonDeputy CIO of Development, Mobility, and Smart Cities • ASU
3:00 - 3:50 PM

Digital Transformation: The ASU University Technology Office Story

  Presented by Chris Richardson • Deputy CIO of Development, Mobility, and Smart Cities • ASU

COVID-19 has accelerated digital transformation to a point we thought we’d reach in 2025. But the groundwork for such a leap was laid some time before at the ASU University Technology Office. Deputy CIO IT Development, Mobility and Smart Cities, Chris Richardson, will share how the culture of innovation at UTO, and its agile mindset, represent an exciting new definition of digital transformation.

Chris Richardson is the Deputy Chief Information Officer Development, Mobility, and Smart Cities at Arizona State University, organized as part of ASU’s University Technology Office. Mr. Richardson and his team are responsible for aligning with key stakeholders to lead the strategy, upgrade cycle, new functionality enhancements, and maintenance of a number of Enterprise applications across the diverse landscape of ASU; key applications to note include myASU, eAdvisor, uAchieve, Salesforce, and Peoplesoft. In addition to development and business analysis with these and other applications, Mr. Richardson’s team is advancing the landscape and vision of mobile applications and standards, web standards, and a User Experience Center of Excellence.

Chris Richardson recently joined ASU from Honeywell where he held several positions over an 11- year career. His most recent role was Senior Director of IT Service Delivery for the Performance Materials and Technologies business group, global accountability of all application and infrastructure operations for a $12B organization. As Director Service Operations Support of the centralized infrastructure organization, his team supported more than 120,000 employees globally for their Service Desk and desktop support experiences, the identity and access management for their systems, the monitoring of critical infrastructure, and all ITIL process ownership for incident, problem, knowledge, access and event management. He has also held responsibility as Director for Desktop Services, Senior Program Manager, IT Audit Manager, European Manager Co-Sourcing, and Senior Business Analyst in the Transportation Systems business group.

Mr. Richardson has also been responsible for product and web development at his own companies, Tru Realty and ASPACT Schools (no longer in existence), as well as at Talisma Corporation and License Online.

Chris holds a double Bachelor of Science in Zoology and Fisheries from the University of Washington, a Master of Arts in Teaching from the University of Puget Sound, and a Master of Business Administration (MIS, Finance, and Entrepreneurship emphases) from the University of Arizona. During Chris’ working career he has obtained PMP, CIPP, and ITIL Expert Lifecycle certifications; he was also a part of Honeywell’s Pathways, IT Leadership Development, and HITS Leadership IT Functional training programs.

Topics: Information Security, Infrastructure
  • Sessions
9:00 - 9:50 AM

Unified Endpoint Management

  Presented by Quest Software

This presentation highlights the reasons and need for Unified Endpoint Management in your business strategy. This presentation’s sole purpose is to educate C-level and system administrators of the need for UEM as well as what aspects are important. One of the problems with endpoint management today is the proliferation of endpoints. During this global health crisis especially, we are seeing a large work-from-home movement in businesses all over the world. In order to combat this issue, you must have an endpoint management strategy that works not only on the network but off of it as well.

Topics: Infrastructure, Strategic Management
10:00 - 10:50 AM

Work from Home: Do You Have a Strategy?

  Presented by Nutanix

As we have seen in 2020, many companies are working to enable their employees to have a work from home capability. However, there are many factors that contribute to whether that will be possible or not. Are their apps supported? What devices are supported? How secure will they be? What latency issues will they incur and where is the data locality?

All of these topics and more will be addressed.

Topics: Culture, Infrastructure
11:00 - 11:50 AM

Office 365 Security Best Practices: At the Office, at Home, and on the Road

  Presented by Mimecast

Cyber-hygiene has become a source of great concern of late. And while the Office 365 suite has helped communication and collaboration from multiple location points (at the office, at home, and on the road) there are still security concerns that must be mitigated. In this presentation, we will hear best practice suggestions for remaining safe while using Office 365. First, we’ll talk about security attitudes, then review CISA concerns with Office 365, and finally offer best practice suggestions and thought leadership. This presentation will be driven by J. Peter Bruzzese… cyber-security advisor and 8x awarded Microsoft MVP (Exchange/Office 365).

Topics: Information Security, Infrastructure
12:00 - 12:50 PM

IoT: Additional Challenges It Poses in a Pandemic-Induced Work Environment

  Presented by Lester Godsey • CISO, Maricopa County

According to SecurityToday.com we will see an estimated 31 billion IoT devices added to the Internet in 2020 and a whopping 75 billion in 2025. While many of these devices are corporate/industrial (IIoT) in nature, there is a very large home/personal IoT market to contend with.

Now that a significant portion business is being done at home and other locations other than the office, what impact are these devices having from a cybersecurity perspective as it relates to:

  • Security vulnerabilities
  • Security controls and awareness, we typically have in corporate networks but lack in home offices
  • What data is leaving corporate systems - inadvertently and purposely
  • Ability to adhere to governmental and industry compliance standards
  • Join us for an in-depth conversation around the 'normal' challenges with IoT devices and solutions and how this new paradigm of working from home exacerbates them.

Topics: Information Security
1:00 - 1:50 PM

Digital Transformation’s Focus in the Shadow of COVID-19 & Cybersecurity in the Equation

  Presented by ACTRA

Digital Transformation has been a major focus affecting every sector over sometime now and a major contributor to increased organizational productivity and workforce transformation. COVID-19 resulted in virtually all organizations going partially or entirely virtual in response to CDC recommendations.

Questions we will answer in this discussion:

  • What lasting impact does COVID-19 have on digital transformation strategies in optimizing process flow and efficiency?
  • What unique cybersecurity considerations might this impact result in for practitioners?
  • Given the potential impact and power of process integration, machine learning, and AI, how is this effecting or may it affect digital transformation in the foreseeable future?

Panelists:
Frank Grimmelmann • President & CEO, ACTRA
Anthony Dezilva • Security Architect, On Semiconductor//Chief Architect ACTRA Global Watch Center
Arthur Hansen • CEO, INCUS5
Mike Manrod • Chief Information Security Officer, Grand Canyon Education (GCE)
Pete Kim • Chief Information Security Officer, Raytheon Missile Systems

Topics: Culture, Infrastructure
2:00 - 2:50 PM

Zero Trust and the Flaming Sword of Justice

  Presented by Cisco

Security breaches pervade the headlines. What was seen as a rare instance just 5 years ago now seems to occupy the daily news cycle. A lot of these data breaches are made possible due to missteps and misconfigurations. There are many security issues introduced into website authentication mechanisms that further compound the security issues in addition to enforcing bad behavior by the end users. Security debt is a real problem for the vast majority of organizations in the world today and the attackers will utilize this to their advantage. In addition to keeping system hygiene at the front of the mind, defenders need to focus on proper network zone segmentation or, as it is a more popular term these days, zero-trust networks. The old conceptual style of a castle wall and moat to defend a network was deprecated several years ago. As a result of the dissolution of the traditional perimeter, a stronger focus has to be placed on the strength of authentication, authorization, and trust models for the users.

The antiquated notion of an information security practitioner running through the office brandishing their flaming sword of justice above their heads screaming “thou shall not pass” has at long last reached the denouement. Whether you are responsible for the security in a financial organization or one that makes teddy bears it is necessary to adapt and learn to trust, but verify."

Topics: Information Security
  • Sessions
9:00 - 9:50 AM

What is HCI and How Does it Enable a Public Cloud On-Prem?

  Presented by Nutanix

Hyperconverged Infrastructure (HCI) has been taking the IT industry by storm the past 5 years. As businesses are exploring what this means to them, they need to ask themselves should we consider changing our infrastructure? During this session we will cover the following discussions:

  • What is HCI exactly and why consider it?
  • Why are companies moving to the cloud and why are they now moving back?
  • How do I create the Public Cloud experience in my own On-Prem solution?
  • What hypervisors work with HCI solutions?
Topics: Infrastructure, Strategic Management
10:00 - 10:50 AM

Ransomware Protection Doesn’t Have to Break the Bank

  Presented by StorageCraft

Ransomware attacks have increased over 130% since the COVID crisis. Everyone is a target and even those with preventative measures in place are at risk. We will review some of the latest attacks and offer best practices in how to protect your organization without increasing budgets.

Topics: Data Storage
11:00 - 11:50 AM

One Company’s Journey to a Modern Data Center Environment

  Presented by Structured

When the facilities team at a healthcare organization in the Pacific Northwest announced to the IT team that they were undertaking a campus remodel project and they needed the on-prem data center for office space, the IT team quickly sprang into action to find a new home for their DR environment. From learning of this management decision, to performing a due diligence assessment of their ability to use a DRaaS solution, into an RFI and RFP process, and coming to agreement on a contract, this was one of the most rigorous evaluation projects the company has undertaken. This presentation will describe that journey of evaluation and discovery, including the rest of the story which describes the onboarding process and challenges faced along the way. Craig Rhodes is an experienced professional actively engaged with various clients providing Data Center and Program Management consulting services.

Topics: Data Center Technology
1:00 - 1:50 PM

Master the Edge: How to Achieve Context-Aware, Zero Trust Network Access

  Presented by Structured & Aruba

Have you been tasked with implementing Zero Trust Network Access but are unsure of how to go about it? Are you confused about how to achieve “minimum access”? Are you struggling with employing “continuous adaptive risk & trust assessment” on your network? If so, attend this session. Learn how to deploy an open, multi-vendor Enterprise security framework that gives security and IT teams an integrated way to gain visibility, control, and advanced threat defense. See how security prioritization and machine learning helps organizations leverage existing third-party solutions to better protect investments and implement proactive risk controls.

Topics: Information Security
2:00 - 2:50 PM

It Ain’t Done ‘Til It’s Automated: Security at the Speed of DevOps

  Presented by Check Point

Have you been tasked with implementing Zero Trust Network Access but are unsure of how to go about it? Are you confused about how to achieve “minimum access”? Are you struggling with employing “continuous adaptive risk & trust assessment” on your network? If so, attend this session. Learn how to deploy an open, multi-vendor Enterprise security framework that gives security and IT teams an integrated way to gain visibility, control, and advanced threat defense. See how security prioritization and machine learning helps organizations leverage existing third-party solutions to better protect investments and implement proactive risk controls.

Topics: Information Security
  • Sessions
9:00 - 9:50 AM

Why Every Business Needs a Business Continuity & Disaster Recovery Strategy

  Presented by Veeam

Today’s applications and data sets are larger, more complex, distributed and interdependent than ever. While many have a disaster recovery plan in place, executing, testing and documenting these plans is often complex and cumbersome.

We'll also discuss:

  • State of BCDR today and what hinders DR planning for most companies
  • Why backup strategy is not DR strategy
  • Democratized DR of today (how tedious, manual procedures can be completely automated, and at accessible cost)
Topics: Business Continuity / Disaster Recovery
10:00 - 10:50 AM

CI/CD for Networking: Adopting DevOps Principles for a More Robust Network

  Presented by Infoblox

In recent years, continuous integration and continuous deployment, aka CI/CD, have become de facto standards for DevOps-minded software development organizations. Adoption of CI/CD enables software architects and IT specialists to create more flexible, secure and agile infrastructure with new features and functionality that are continually improved and deployed. While compute and storage aspects of environments have benefited greatly from CI/CD, network infrastructure has lagged behind.

This presentation pulls back the covers on efforts taking place to bring CI/CD philosophies to the work of revamping legacy, monolithic network architectures using cloud-native principles, microservices and containerization. The end goal is to create networks that are inherently more adaptable, scalable, automated and simpler to manage.

Speaker Bio: Glenn Sullivan is a Principal Product Manager for Emerging Technologies at Infoblox and joined the Infoblox team when SnapRoute, a company he co-founded in 2015, was acquired by Infoblox. At SnapRoute, Sullivan was responsible for product direction by advocating for the end-user. Prior to founding SnapRoute, Sullivan was responsible for building out hyperscale data center environments at Apple. In addition to core network operational functions, Sullivan led efforts to automate the lifecycle management of various platforms in a multivendor environment. Before Apple, Sullivan was a specialist support engineer on the LAN Switching team in Cisco TAC. While there, his specialty was in turning around customer sentiment by focusing on escalated issues and transforming the customer experience into a positive one. Sullivan has a BS in Network and Systems Administration from RIT (Rochester Institute of Technology).

Topics: Infrastructure, Unified Communications
11:00 - 11:50 AM

Zero-Trust Network Access

  Presented by Fortinet

Controlling users and devices on today’s networks is challenging. Many types of users requiring different levels of access need an automated solution. Devices are sneaking onto networks without approval and require visibility and control. Learn how Zero-Trust Network Access solution addresses the issue of knowing who, what, where and when and controlling everyone and everything on and off the network.

Topics: Infrastructure
2:00 - 2:50 PM

Updating Your BC/DR Plan to Include Pandemic

  Presented by INTERFACE Advisory Council

You were ready for a power outage. Cooling equipment has worked properly in your server room or data center. You had plenty of backup in the cloud and you felt good about your BC/DR plan, until a pandemic hit. The sudden shift to remote working for many industries forced rapid change for IT staffs to alter their business continuity process. Some of these changes were temporary, while some longer lasting.

Join the INTERFACE-Phoenix Advisory Council for a look at what BC/DR adjustments they have made in 2020. You will get tips on what has worked and what still is a challenge in keeping your users active and ensuring your business is fully operational.

Panelists:
Steven Porter • Manager of Information Technology, Alpha Geotechncial & Materials
Joanne Storbeck • Director of Business Continuity, HealthEquity
Jerry Simpson • Manager of Fire Technology, Phoenix Fire Technical Services

Topics: Business Continuity / Disaster Recovery

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Brad Boynton
Manager, SOC
Orion Health

Rafael Cruz
Sr Information Engineer
Charles Schwab

Lori  Cunningham
Deputy CIO, Operations
AZ Dept of Economic Security

Pamela  Davis
Cyber Security Threat Intelligence
American Airlines

Rachel Evans
Director, Information Technology
Maricopa County Sheriff’s Office

Ilene  Klein
Cybersecurity Program Coordinator
City of Phoenix

Michael Leff
Manager, Information Technology
Cutter Aviation

Monty Low
Director, Information Technology
Arizona Coyotes

Tom Magrini
Deputy Chief Information Officer
City of Phoenix

Michael Manrod
Chief Information Security Officer
Grand Canyon Education

Randall Mitchell
VP, Information Systems
The Phoenix Symphony

Peter Newman
Faculty Chair, Engineering & Info Science
DeVry University

Pam Palestini
Manager, Information Security
Wells Fargo

Steven Porter
Manager, Information Technology
Alpha Geotechncial & Materials

Thom Ratke
VP, Risk Integration Management
Wells Fargo

Bob Sanowski
Sr Director, Information Technology
Dignity Health

Jerry Simpson
Manager, Fire Technology
Phoenix Fire Technical Services

John Stark
Information Security Officer
AZ Dept of Health Services

Keith Stocks
VP, Information Risk Management
Union Bank

Joanne Storbeck
Director, Business Continuity
HealthEquity

Isaiah Washington
Director, Information Technology
Glendale Community College

Robert  Werhanowicz
Director of Instructional Technology
Buckeye Union High School

David Williams
Chief Information Officer
Southwest Network

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Nutanix

Nutanix

Nutanix
Nutanix makes IT infrastructure invisible with an enterprise cloud platform that delivers the agility and economics of the public cloud, without sacrificing the security and control of on-premises infrastructure.
Visit Website
Quest Software

Quest Software

Quest Software
At Quest, we solve complex problems with simple solutions. Our philosophy is focused on great products, great service and being simple to do business with. We deliver technology that eliminates the need to choose between efficiency and effectiveness.
Visit Website
StorageCraft

StorageCraft

StorageCraft
Arcserve is a global top 5 data protection vendor with best-in-class solutions that manage, protect, and recover all data workloads, from SMB to enterprise and regardless of location or complexity. A 100% channel-centric organization, Arcserve has a presence in over 150 countries, with 19,000 channel partners and 235,000 customers.
Visit Website

SILVER SPONSORS

Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
Cisco

Cisco

Cisco
Cisco is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. Cisco delivers intelligent cybersecurity for the real world.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet helps organizations across the public and private sectors protect the systems, data, and services that keep businesses and communities running. From government agencies and schools to enterprises and service providers, leaders rely on Fortinet to secure critical infrastructure, ensure operational continuity, and defend against evolving cyber threats. Our Security Fabric platform unifies networking and security to deliver the visibility, control, and efficiency organizations need to operate confidently, whether virtual, in the cloud, or on-premises.
Visit Website
Infoblox

Infoblox

Infoblox
Infoblox unites networking and security to deliver unmatched performance and protection. Trusted by Fortune 100 companies and emerging innovators, we provide real-time visibility and control over who and what connects to your network, so your organization runs faster and stops threats earlier.
Visit Website
Malwarebytes

Malwarebytes

Malwarebytes
Malwarebytes protects workplace productivity. We secure all your endpoints so employees can connect confidently, from anywhere. We combine analytics-driven, multi-layer threat protection and industry-leading incident response to both simplify and strengthen overall cybersecurity. You and your team stay up and running, so you can remain focused on driving your business.
Visit Website
Mimecast

Mimecast

Mimecast
Mimecast is a cybersecurity provider that helps thousands of organizations worldwide make email safer, restore trust and bolster cyber resilience.
Visit Website
Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website
Trend Micro

Trend Micro

Trend Micro
Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website

BRONZE SPONSORS

Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
ESET

ESET

ESET
For more than 30 years, ESET® has been developing industry-leading IT security software and services to protect businesses, critical infrastructure, and consumers worldwide.
Visit Website
ExtraHop

ExtraHop

ExtraHop
ExtraHop delivers enterprise cyber analytics that allow you to quickly investigate threats, ensure the delivery of critical applications, and secure your investment in the cloud.
Visit Website

EXHIBITORS & ASSOCIATIONS

Acceptto

Acceptto

Acceptto
Acceptto's continuous behavioral authentication eGuardian® platform protects your identity from cyber-attacks and data breach.
Visit Website
ACP Phoenix

ACP Phoenix

ACP Phoenix
ACP is a professional organization that provides a forum for the exchange of experiences and information for business continuity leaders throughout a network of local Chapters.
Visit Website
ACTRA

ACTRA

ACTRA
ACTRA serves as the hub for collaborative information sharing, where partners from industry, government, academia, law enforcement and intelligence come together, to respond to cyber threats, protecting our nation’s security interests.
Visit Website
AFCOM Phoenix

AFCOM Phoenix

AFCOM Phoenix
AFCOM advances data center professionals by delivering comprehensive and vendor-neutral education and peer-to-peer networking to its members around the globe.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
InfraGard Arizona

InfraGard Arizona

InfraGard Arizona
Arizona InfraGard’s Mission is to help protect Arizona’s infrastructure by supporting the priorities of the FBI to cultivate partnerships with public and private sectors through the sharing of actionable information,training and educational events.
Visit Website

Interested in becoming part of our next Phoenix event?

CONTACT US FOR INFO

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.