F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Virtual Phoenix 2021 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

June 24th, 2021
8:30am – 4:30pm

Virtual Conference
Multi-track seminars with Q&A
1-on-1 chat and networking
Hourly prize drawings

KEYNOTE: [1 CPE] Dealing with Ransomware: The Past, Present, and the Future

  Presented by Erik Graham • Security Incident & Investigations Manager, Marsh & McLennan Companies

Seminar Schedule

  • Theater One
  • Theater Two
  • Theater Three
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Discover How SD-WAN Edge and Cloud Security are Enabling Digital Transformation

  Presented by Silver Peak

Adoption of cloud services and the explosive increase in mobile and IoT devices have driven enterprises to transform both their WAN and security architectures – not just one or the other. The strategic imperative is to deploy a more intelligent, highly automated software-defined wide area network (WAN) that can be seamlessly integrated with modern cloud-delivered security services. Gartner coined the term “secure access service edge” (SASE) to describe this cloud-first architecture. During this session, we’ll discuss:

  • SD-WAN and security considerations enterprises must address when migrating to a SASE architecture
  • How to address Zero Trust access security requirements for remote workers and IoT
  • Pros and cons of single vendor vs multi-vendor SASE implementations
Topics: Data Storage, Infrastructure
10:00 - 10:50 AM

[1 CPE] Real-Time Defender Velocity: Code on Code Warfare

  Presented by SentinelOne

Organizations spend more money on cyber security tools every year, yet the number of breaches and the cost of these breaches continues to increase. A new approach is needed that relies on autonomous analysis that can respond at machine speed. By embracing automation, AI, and big data analytics, organizations can better prevent threats, find, and detect what is missed, provide contextual linking for forensic and threat hunting ¬– and even more importantly – self-heal and fully recover when necessary.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Leveraging Assessment Findings to Harden Your Security Perimeter

  Presented by Fortinet

Are you regularly evaluating your network security?

Performing assessments is a tried-and-true method for improving your security posture, but they can be a daunting task for network security staff who are often short on manpower, expertise, and/or time. Regardless, the benefits of running assessments almost always outweigh any potential drawbacks. Having a security assessment in hand will increase your security situational awareness and significantly impact your organization’s risk preparedness and mitigation.

Join us as we discuss the importance of periodically validating your existing security controls and provide learnings and best practices from our experts.

Topics: Information Security
12:00 - 12:50 PM

[1 CPE] Addressing America’s Cyber Dilemma in the Wake of Cyber Disarray

  Presented by Frank J. Grimmelmann • President & CEO for ACTRA

In the wake of the Colonial Pipeline Ransomware Attack, the Solarwinds compromise, and the Microsoft Breach, it’s easy to lose focus on the big picture and how our institutions are responding to the increasingly hostile threat landscape and capable adversaries! This session will briefly highlight significant trends in the threat landscape driving response, explore the team put in place by Washington’s new administration to address the threat, reveal the policy foundation and current execution roadmap, and evaluate the balance between Active Defense and Privacy/Cybersecurity considerations. This session will engage you and leave you with several questions to consider in shaping your own priorities in response to our country’s direction in responding to the ‘clear and apparent cyber danger’ that evidences itself daily.

Mr. Frank J. Grimmelmann serves as President & CEO for the Arizona Cyber Threat Response Alliance (ACTRA), a non-profit entity, that was developed collaboratively with the FBI’s Arizona InfraGard Program and independently launched in 2013 to enable its private/public sector members to enable themselves to respond to the escalating national cybersecurity threat.

Mr. Grimmelmann Co-Chairs Governor Ducey’s AZ Cybersecurity Team (‘ACT’) and is a Founding Member of President Obama’s National ISAO Leadership Group at the University of Texas at San Antonio (UTSA). As ACTRA’s leader, Mr. Grimmelmann was the first private sector representative in the Arizona Counter Terrorism Information Center (ACTIC) on its Executive Board. He has held C-level positions in Finance, healthcare, and government, focusing on cybersecurity in response to 9/11. He holds an MBA in Finance/International Business from UC Berkeley and a BA in Operations with a Business Law minor from the University of South Florida.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] The Rise of Secure Access Service Edge

  Presented by Bitglass

Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While legacy tools like firewalls are no longer equipped to handle the modern IT ecosystem, SASE platforms are built for this exact moment.

In this presentation, you will learn:

  • The core components SASE
  • The functionality you need to secure cloud, web, and remote access use cases
  • Architectural considerations for SASE platforms
Topics: Information Security
2:00 - 2:50 PM

[1 CPE] The Evolution of Vulnerability Management

  Presented by Optiv Security & Tenable

A proactive, risk-driven Vulnerability Management approach delivers comprehensive, continuous visibility and informs technical and business decisions. Join Tenable’s Nathan Wenzler and Optiv’s Doug Drew (a respected Tenable Guardian) as they discuss real-world VM challenges and how to manage and measure your cyber risk.

Topics: Information Security, Strategic Management
Erik GrahamErik GrahamSecurity Incident & Investigations Manager, Marsh & McLennan Companies
3:00 - 3:50 PM

[1 CPE] Dealing with Ransomware: The Past, Present, and the Future

  Presented by Erik Graham • Security Incident & Investigations Manager, Marsh & McLennan Companies

Any company or government organization of any size anywhere in the world can become a victim of ransomware at any time. Each attack is moving further up in the headlines, making it a discussion point with many people. But how did we get to this point where so many can become victims overnight to this crime? In this presentation, Erik will cover the beginnings of ransomware, how it has evolved, and what you need to do so you don’t become the next victim and headline. He will also cover what do to and not do when you become a victim and outline the long road to recovery. Because the truth of the matter is, it’s not if you will become a victim, but when. Taking the right actions now can minimize the impact of what can be an extinction-level event for a company.

Erik Graham is a manager on the Security Risk / Incident Management team at Marsh & McLennan; he is responsible for the identification, documentation, and communication of security risks as well as the analysis, eradication, and recovery of cyber incidents that affect Marsh & McLennan’s information assets.

Erik has been working in the computer industry for 25+ years with over 20+ years directly focused on computer security/information assurance. He has worked in a wide variety of both logical and physical security areas related to computer network attack (CNA) and computer network defense (CND). Currently, he is working in multiple areas such as risk identification and management, evaluating emerging technologies, malware analysis, and threat intelligence.

Erik has a Bachelor of Science from the University of Phoenix, a Master of Science in Information Assurance from Norwich University, and holds multiple industry certifications to include CISSP-ISSAP, CISM, CRISC, and CDPSE.

Topics: Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] Disaster Recovery Reality Check: Validating Your DR Strategy

  Presented by StorageCraft

Do you have a DR strategy? Learn more from those on the inside of data protection and disaster recovery. See how you compare to other’s DR capabilities and how to build a solid strategy. We’ll also cover key DRaaS capabilities and a solution to make part of our plan.

Topics: Business Continuity / Disaster Recovery
10:00 - 10:50 AM

[1 CPE] CI/CD for Networking: Adopting DevOps Principles for a More Robust Network

  Presented by Infoblox

In recent years, continuous integration and continuous deployment, aka CI/CD, have become de facto standards for DevOps-minded software development organizations. Adoption of CI/CD enables software architects and IT specialists to create more flexible, secure and agile infrastructure with new features and functionality that are continually improved and deployed. While compute and storage aspects of environments have benefited greatly from CI/CD, network infrastructure has lagged behind.

This presentation pulls back the covers on efforts taking place to bring CI/CD philosophies to the work of revamping legacy, monolithic network architectures using cloud-native principles, microservices and containerization. The end goal is to create networks that are inherently more adaptable, scalable, automated and simpler to manage.

Speaker Bio: Glenn Sullivan is a Principal Product Manager for Emerging Technologies at Infoblox and joined the Infoblox team when SnapRoute, a company he co-founded in 2015, was acquired by Infoblox. At SnapRoute, Sullivan was responsible for product direction by advocating for the end-user. Prior to founding SnapRoute, Sullivan was responsible for building out hyperscale data center environments at Apple. In addition to core network operational functions, Sullivan led efforts to automate the lifecycle management of various platforms in a multivendor environment. Before Apple, Sullivan was a specialist support engineer on the LAN Switching team in Cisco TAC. While there, his specialty was in turning around customer sentiment by focusing on escalated issues and transforming the customer experience into a positive one. Sullivan has a BS in Network and Systems Administration from RIT (Rochester Institute of Technology).

Topics: Infrastructure, Unified Communications
11:00 - 11:50 AM

[1 CPE] Zero Trust: From Theory to Reality in Five Steps

  Presented by Guardicore

Let’s be real. True to its name, there is zero trust about the term “zero trust.” It’s been used as marketecture since its inception. Cut through the fog with this presentation with practical insight and steps to take to ensure your organization makes the most out of ZTA.

Topics: Information Security
12:00 - 12:50 PM

[1 CPE] Ransomware In Focus: How AI Surgically Contains the Threat

  Presented by Darktrace

In the immediate aftermath of a ransomware attack, executives too often face a difficult dilemma: either pay a ransom or shut down critical systems and services. In today’s increasingly complex digital ecosystems, the collateral damage that ensues from ransomware attacks can be broad-ranging and destructive, with organizations taking days, weeks, or even months to recover.

But what if there was another way out – a way to surgically contain ransomware in its earliest stages, without disrupting normal business operations? Join this presentation to learn how Cyber AI is helping thousands of organizations fight back against ransomware. We’ll discuss:

  • The impact of ‘double-extortion’ ransomware and ‘ransomware-as-a-service’
  • Real-world examples of ransomware detected by Cyber AI
  • How self-learning AI responds proportionately to ransomware, thanks to its deep understanding of an organization’s pattern of life
Topics: Information Security
1:00 - 1:50 PM

[1 CPE] What Got Us Here, Won’t Get Us to Where We’re Going…

  Presented by Aruba, a HPE Company

Over the past couple of decades, we’ve relied on a certain predictable and repeatable model of expectations from our infrastructure that has delivered. However, the demands of Digital Transformation, the pace of change, the capabilities within our teams -- and of course the pandemic -- have created business pressures that traditional ways of building and security infrastructure just can’t keep pace with.

The time is now to reflect, reset, and embrace a different way that will increase agility and flexibility as well as enhance performance and security. Lose the baggage of the past, travel light, and let’s chart a course for the journey ahead.

Topics: Business Continuity / Disaster Recovery, Information Security, Infrastructure
2:00 - 2:50 PM

[1 CPE] Back to Basics: Where Technology and Security Intersect to Protect Against Ransomware

  Presented by INTERFACE Advisory Council

After years of being at the periphery of society, ransomware and cyber threats are now taking center stage as they begin to impact the lives of the broader population. As increased attention begins to turn toward protecting against these attacks, it becomes obvious that throwing new advanced solutions at each aspect of the problem can only take us so far. It is necessary to circle back to foundational elements of our security posture and combine the old with new for elevated levels of protection.

Speakers:
Mike Manrod • Chief Information Security Officer, Grand Canyon Education
Christian Taillon • Threat Response Engineer, Grand Canyon Education

Mike Manrod presently serves as the Chief Information Security Officer for Grand Canyon Education, responsible for leading the security team and formulating the vision and strategy for protecting students, staff, and information assets across the enterprise. Previous experiences include serving as a threat prevention expert for Check Point and working as a consultant and analyst for other organizations.

He is also a co-author/contributor for the joint book project, Understanding New Security Threats published by Routledge in 2019, along with multiple articles/whitepapers. When not working, he spends time playing video games with his kids, practicing martial arts, and doing anything outdoors.

Christian Taillon contributes to Grand Canyon Education's IT Security team as an Engineer. His efforts focus primarily on improving the Security Operations team's capability to efficiently detect and effectively respond to threats through work primarily relating to Splunk, EDR, and an evolving Threat Intelligence program. He enjoys contributing to the larger community via various Threat Intelligence Content Development efforts and open-source projects. He leads the Global Watch Center operations at ACTRA and contributes to SPORTS-ISAO under the Cyber Resilience Institute as a Solutions Architect. When away from the keyboard, he enjoys camping, kayak, and hiking with his wife.

Topics: Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] The Evolution of Vulnerability Management

  Presented by Optiv Security & Tenable

A proactive, risk-driven Vulnerability Management approach delivers comprehensive, continuous visibility and informs technical and business decisions. Join Tenable’s Nathan Wenzler and Optiv’s Doug Drew (a respected Tenable Guardian) as they discuss real-world VM challenges and how to manage and measure your cyber risk.

Topics: Information Security, Strategic Management
10:00 - 10:50 AM

[1 CPE] How Zero-Trust Enables the Future of “Work from Anywhere” Secure Access

  Presented by Duo Security

The perimeter-focused security model of decades past is no longer adequate for securing the modern enterprise. Now, organizations must secure a mobile workforce using a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks — and this trend only accelerated during 2020's global shift to remote work. Fortunately, a modern access strategy built on zero-trust fundamentals can defend today’s workforce while paving the way to a passwordless future. Attend this session to learn how the zero-trust access model works, reduce your reliance on passwords and risk of password-based attacks, and how to start planning and staging your zero-trust evolution today.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Securing the Hybrid Cloud: Visibility Best Practices

  Presented by Gigamon

With the move to cloud and the multitude of approaches, your ability to effectively monitor and secure workloads gets even more difficult. IT complexity, the rate of change, lack of skills, and organizational silos have made confidently managing security and performance nearly impossible. Visibility is critical. Join us for a discussion of the security considerations for on-prem private, public, and hybrid clouds. You’ll learn best practices and see how a little planning and design can go a long way. Achieve a secure and viable hybrid cloud implementation and get a high return on your investment.

Topics: Data Storage, Infrastructure
1:00 - 1:50 PM

[1 CPE] Do You Feel the Need… the Need for Speed? Top Five SQL Server Query Tuning Tips

  Presented by Quest Software

Query tuning is key to peak performance in SQL Server databases. However, lots of developers and DBAs constantly struggle to pinpoint the root cause of performance issues and spend way too much time trying to fix them. In this presentation, Quest will share their tried-and-true best practices for tuning SQL statements and other issues by utilizing Wait Time Analysis, reviewing execution plans, and using SQL diagramming techniques. In addition, we’ll present several case studies to demonstrate these best practices.

Regardless of the complexity of your database or your skill level, this systematic approach will lead you down the correct tuning path with no guessing, saving countless hours of tuning queries and optimizing the performance of your SQL Server databases.

Topics: Infrastructure, Strategic Management
2:00 - 2:50 PM

[1 CPE] Disaster Recovery Reality Check: Validating Your DR Strategy

  Presented by StorageCraft

Do you have a DR strategy? Learn more from those on the inside of data protection and disaster recovery. See how you compare to other’s DR capabilities and how to build a solid strategy. We’ll also cover key DRaaS capabilities and a solution to make part of our plan.

Topics: Business Continuity / Disaster Recovery

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Brenda Bergman-Niehaus
Manager, Information Security
American Express

Don Clariza
Sr Officer, Business Risk and Control
Wells Fargo

Rafael Cruz
Sr Information Engineer
Charles Schwab

Lori  Cunningham
Deputy CIO, Operations
AZ Dept of Economic Security

Pamela  Davis
Cyber Security Threat Intelligence
American Airlines

Rachel Evans
Director, Information Technology
Maricopa County Sheriff’s Office

Lester Godsey
Chief Information Security Officer
Maricopa County

Luke Guillow
Manager, Information Technology
ReBath LLC

Stephanie Inners
Manager, IT & Systems
R. E. Darling Co., Inc.

Ilene  Klein
Cybersecurity Program Coordinator
City of Phoenix

Tom Magrini
Deputy Chief Information Officer
City of Phoenix

Mike Manrod
Chief Information Security Officer
Grand Canyon Education

Peter Newman
Faculty Chair, Engineering & Info Science
DeVry University

Jerry Simpson
Manager, Information Technology
Phoenix Fire Technical Services

Steve Smith
Sr Information Security Officer
Glendale Community College

John Stark
Information Security Officer
AZ Dept of Health Services

Keith Stocks
VP, Information Risk Management
Union Bank

Joanne Storbeck
Director, Business Continuity
HealthEquity

Isaiah Washington
Chief Information Officer
Glendale Community College

David Williams
Chief Information Officer
Southwest Network

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
Optiv

Optiv

Optiv
Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential.
Visit Website
Silver Peak

Silver Peak

Silver Peak
Silver Peak, recently acquired by HPE Aruba, delivers networking software that powers a self-driving wide area network (SD_WAN) that learns and adapts to requirements of the business to ensure the highest levels of end user and application performance.
Visit Website
StorageCraft

StorageCraft

StorageCraft
Arcserve is a global top 5 data protection vendor with best-in-class solutions that manage, protect, and recover all data workloads, from SMB to enterprise and regardless of location or complexity. A 100% channel-centric organization, Arcserve has a presence in over 150 countries, with 19,000 channel partners and 235,000 customers.
Visit Website
Tenable

Tenable

Tenable
Tenable, Inc., is the Cyber Exposure company. Over 30,000 organizations around the globe rely on Tenable to understand and reduce cyber risk.
Visit Website

SILVER SPONSORS

Bitglass

Bitglass

Bitglass
Bitglass’ Total Cloud Security Platform is the only secure access service edge offering that combines a Gartner-MQ-Leading cloud access security broker, the world’s only on-device secure web gateway, and zero trust network access to secure any interaction.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
Duo Security

Duo Security

Duo Security
Duo Security, now part of Cisco, is the leading multi-factor authentication (MFA) and secure access provider. Duo is a trusted partner to more than 25,000 customers globally, including Facebook, Yelp, Zillow and more.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface & the power to take on the ever-increasing performance requirements of the borderless network – today and into the future.
Visit Website
Gigamon

Gigamon

Gigamon
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.
Visit Website
Guardicore

Guardicore

Guardicore
Guardicore, now part of Akamai, delivers easy-to-use Zero Trust network segmentation to security practitioners across the globe. Our mission is to minimize the effects of high-impact breaches, like ransomware, while protecting the critical assets at the heart of your network. We shut down adversarial lateral movement, fast. From bare metal to virtual machines and containers, Guardicore has you covered across your endpoints, data centers and the cloud. Our software-based platform helps you become more secure to enable your organization’s digital transformation.
Visit Website
Infoblox

Infoblox

Infoblox
Infoblox unites networking and security to deliver unmatched performance and protection. Trusted by Fortune 100 companies and emerging innovators, we provide real-time visibility and control over who and what connects to your network, so your organization runs faster and stops threats earlier.
Visit Website
Quest Software

Quest Software

Quest Software
At Quest, we solve complex problems with simple solutions. Our philosophy is focused on great products, great service and being simple to do business with. We deliver technology that eliminates the need to choose between efficiency and effectiveness.
Visit Website
SentinelOne

SentinelOne

SentinelOne
SentinelOne is the future of Endpoint Protection. It unifies prevention, detection and response in a single platform driven by sophisticated machine learning and intelligent automation. It can adapt your defenses against the most advanced cyber-attacks.
Visit Website

BRONZE SPONSORS

Extreme Networks

Extreme Networks

Extreme Networks
Extreme Networks, Inc. (EXTR) delivers software-driven networking solutions that help IT departments everywhere deliver the ultimate business outcome: stronger connections with customers, partners and employees.
Visit Website
TRIPWIRE

TRIPWIRE

TRIPWIRE
Tripwire delivers advanced threat, security and compliance solutions used by over 9,000 organizations, including over 50% of the Fortune 500. Tripwire enables enterprises around the world to detect, prevent, report and respond to cyber security threats.
Visit Website

EXHIBITORS & ASSOCIATIONS

ACP Phoenix

ACP Phoenix

ACP Phoenix
ACP is a professional organization that provides a forum for the exchange of experiences and information for business continuity leaders throughout a network of local Chapters.
Visit Website
ACTRA

ACTRA

ACTRA
ACTRA serves as the hub for collaborative information sharing, where partners from industry, government, academia, law enforcement and intelligence come together, to respond to cyber threats, protecting our nation’s security interests.
Visit Website
AFCOM Phoenix

AFCOM Phoenix

AFCOM Phoenix
AFCOM advances data center professionals by delivering comprehensive and vendor-neutral education and peer-to-peer networking to its members around the globe.
Visit Website
Arizona Technology Council

Arizona Technology Council

Arizona Technology Council
The Arizona Technology Council is the driving force behind making our state the fastest growing technology hub in the nation; connecting and empowering Arizona’s technology community.
Visit Website
ARMA Arizona

ARMA Arizona

ARMA Arizona
The mission of ARMA International is to educate, advocate, and provide resources that enable professionals to manage information as a critical element of organizational operations and governance.
Visit Website
CompuNet

CompuNet

CompuNet
CompuNet is a leading U.S. information technology partner, headquartered in Boise, Idaho. The firm specializes in consultation, design and implementation services specifically tailored to solve business problems. With a best-in-class engineering staff and approach, CompuNet focuses on building lasting relationships that prioritize client satisfaction over sales through every step of the journey.
Visit Website
CSA Southwest

CSA Southwest

CSA Southwest
To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.
Visit Website
ExtraHop

ExtraHop

ExtraHop
ExtraHop delivers enterprise cyber analytics that allow you to quickly investigate threats, ensure the delivery of critical applications, and secure your investment in the cloud.
Visit Website
InfraGard Arizona

InfraGard Arizona

InfraGard Arizona
Arizona InfraGard’s Mission is to help protect Arizona’s infrastructure by supporting the priorities of the FBI to cultivate partnerships with public and private sectors through the sharing of actionable information,training and educational events.
Visit Website
ISSA Phoenix

ISSA Phoenix

ISSA Phoenix
The mission of the Phoenix ISSA Chapter is to provide a forum for the education of information security to its members through presentations and open discussions on topics important to the members and the information security industry.
Visit Website
PMI Phoenix

PMI Phoenix

PMI Phoenix
Project Management Institute (PMI) is the world's leading not-for-profit professional membership association for the project, program and portfolio management profession.
Visit Website
SDSUG

SDSUG

SDSUG
SDSUG is a group of information technology professionals in the Phoenix area dedicated to the security of our digital systems. We meet quarterly to discuss security issues, tech trends, and share our successes and failures so we can learn from each other.
Visit Website

Interested in becoming part of our next Phoenix event?

CONTACT US FOR INFO

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.