F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Phoenix 2023 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Phoenix EVENTS

AT A GLANCE

June 15th, 2023
8:30am – 4:30pm

Westin Kierland Resort
Grand Ballroom
6902 E. Greenway Parkway
Scottsdale, AZ 85245

Directions & Parking

KEYNOTE: [1 CPE] Evening the Odds of Cyber Warfare

  Presented by Michael Lettman • Cyber Security Advisor, Cybersecurity and Infrastructure Security Agency

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Exploring the Anatomy of Modern-Day Breaches

  Presented by Tim Medin, CEO • Red Siege

Join this presentation for a comprehensive overview of modern cybersecurity threats and how breaches occur. We will highlight the various methods used by cybercriminals, including phishing, social engineering, and ransomware attacks, and emphasize the importance of identifying and addressing vulnerabilities before they can be exploited. Throughout the presentation, we'll discuss the importance of a proactive approach to cybersecurity, including regular security assessments, penetration testing, and vulnerability scanning, as well as education and training for employees to recognize and report suspicious activity. There are a lot of vulnerabilities in the wild, and IT administrators and security professionals often focus on the wrong issues because they are easier to monitor or measure. By the end of the presentation, you will have gained valuable insights into the latest cybersecurity threats and how to protect against them.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Hybrid Cloud: Empowering IT with Resiliency, Multicloud Strategies, Optimal Spend, & Sustainability

  Presented by Michael Donahue, Sr Director, Hybrid Cloud and XaaS  • Hitachi Vantara

The hybrid cloud has emerged as a game-changing paradigm for modern IT infrastructure, offering IT Leaders and above a wealth of opportunities to drive innovation and efficiency. With the ever-increasing demand for cyber resiliency, flexibility, and sustainability, it is crucial for IT constituents to grasp the intricacies of the hybrid cloud, including key concepts such as security, multicloud, nearcloud, cloud spend optimization, data refactorization, and sustainability practices.

Throughout the session, real-world case studies and examples will be shared from Day 0, Day 1, and Day 2 customers.

  • Day 0 means you want to take advantage of this new framework but are still working through how to adopt hybrid cloud, how to secure it, and how to recruit proper talent to maximize it.
  • Day 1 means your organization took the first step and has a minimum spend commit they must meet. However, you’re still unsure of how to meet it because you’re still determining which applications to refactor, which containerized microservices to adopt, how to reskill existing talent, and how to implement your compliance and governance strategy.
  • Day 2 means your organization has already overcome these hurdles. Nice work! Instead of worrying about hitting a minimum spend commit, you’re now focused on optimizing your environment to limit sprawling cloud costs and looking towards data repatriation efforts.

Participants will have the opportunity to engage in interactive discussions and pose questions, fostering a collaborative learning environment. By the end of this session, IT Leaders will have the knowledge and tools necessary to evaluate, plan, and implement hybrid cloud solutions that align with their organization's goals, including sustainability. Afterall, Hitachi is committed to providing solutions that are exclusively carbon-neutral or zero-carbon, ensuring a sustainable and environmentally friendly approach.

Topics: Infrastructure
11:00 - 11:50 AM

[1 CPE] Open Source Developers Are Security’s New Front Line

  Presented by Austin Steffes, Sales Engineer • Sonatype

Bad actors have recognized the power of open source and are now beginning to create their own attack opportunities. This new form of assault allows hackers to poison the well, where OSS project credentials are compromised, and malicious code is intentionally injected into open source libraries. In this session, Sonatype will explain how both security and developers must work together to stop this trend or risk losing the entire open source ecosystem.

  • Analyze and detail the events leading to today’s “all-out” attack on the OSS industry.
  • Define the future of open source in today’s new normal.
  • Outline how developers can step into the role of security to protect themselves and the millions of people depending on them.
Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Shattered Perimeters

  Presented by Erik Graham, Marsh & McClennan Co.

Prior to COVID, the cyber perimeter of a business was relatively well defined. The business knew what information assets held what information. With COVID, it was necessary to change the cyber perimeter quickly to keep business alive. Today many businesses cannot tell you what information assets hold their data or how that data is protected. In this presentation, Erik Graham will cover several of the major risks with work-from-home (WFH) and possible solutions to those risks.

Erik Graham is a lead incident responder on the incident response team at Marsh & McLennan; he is responsible for the identification, documentation, and communication of security risks as well as the analysis, eradication, and recovery of cyber incidents that affect Marsh & McLennan’s information assets.

Erik has been working in the computer industry for 25+ years with over 20+ years directly focused on computer security and information assurance. He has worked in a wide variety of both physical and logical security areas related to computer network attack (CNA) and computer network defense (CND). Currently, he is working in multiple areas such as risk identification and management, evaluating emerging technologies, malware analysis, supply chain analysis, and cloud security.

Erik has a Bachelor of Science from the University of Phoenix, and a Master of Science in Information Assurance from Norwich University, and holds multiple industry certifications including CISSP-ISSAP, CISM, CRISC, and CDPSE.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Panel: Retaining Your IT Staff in a Post-Pandemic Workforce, Can it Be Done?

  Presented by INTERFACE Advisory Council

“The other company is offering higher wages. I get to work remotely as much as I want, and I am getting a four-day workweek. Sorry, but I must take it.” Have you heard this just a few times? So many IT hiring managers are having to find creative ways to keep staff members in-house. While budgets and major company overhauls can’t always be achieved, some methods can help.

Over the last three years, IT leaders have had unique challenges develop for retaining staff. Join the INTERFACE Advisory Council for an open conversation on how to keep your IT staff intact. This panel features local area IT hiring managers and leaders that deal with these challenges in their shops. Bring your questions as there will be an opportunity to get advice on your needs.

Panelists:

  • Pamela Davis, Cyber Security Threat Intelligence, Southwest Airlines
  • George Gerardo, Director, Information Technology, West-MEC
  • Stephanie Inners, Manager, IT & Systems, R. E. Darling Co., Inc.
  • John Kullman, Sr Manager, Network, Yuma County
Topics: Culture
Michael LettmanMichael LettmanCyber Security Advisor, Cybersecurity and Infrastructure Security Agency
3:00 - 3:50 PM

[1 CPE] Evening the Odds of Cyber Warfare

  Presented by Michael Lettman • Cyber Security Advisor, Cybersecurity and Infrastructure Security Agency

Protecting your network and data is always a challenge. Threats can come from hackers looking to cause trouble, disgruntled employees, or users that don’t realize they are being targeted. Possibly the biggest threat now is cyber warfare. Nation States are sponsoring campaigns of disinformation and are constantly looking to disrupt any systems they can. Technology professionals have a great ally in this battle and help is available now.

In this session, you will learn about the Department of Homeland Security’s (DHS) youngest agency, the Cybersecurity and Infrastructure Security Agency (CISA), and resources available at “no cost” to State, Local, Tribal, and Territorial governments and organizations with critical infrastructure. Your enemies will use any tools they have, even drones, to attack your systems. Come get the information you need to stay on top of the current threat landscape.

Mike Lettman is the Cyber Security Advisor for Region 9 with the Department of Homeland Security. The mission of cyber security advisors is to provide direct coordination, outreach, and regional support to protect cyber components essential to the sustainability, preparedness, and protection of the Nation’s Critical Infrastructure and Key Resources (CIKR) and State, Local, Tribal, and Territorial (SLTT) governments. This is primarily accomplished with tools and assessments to test an organization's resilience and cyber maturity. Mike has served in several capacities on many cyber and security teams, task forces, and committees over his career. He is currently sitting on the Governor’s Arizona Cyber Team (ACT), a member of the Arizona Counter Terrorism Information Center (ACTIC), and a member of the State of Arizona’s Cyber Disruption Planning Group.

Prior to becoming the Arizona CSA, Mike was the Chief Information Security Officer (CISO) for the State of Arizona for 6 years and the CISO for the State of Wisconsin for 8 years. Mike is currently only one of three people in the country that has worked as a CISO for two different state governments. During this time Mike has briefed four Governors offices, many Adjutants Generals, and policy advisors on cyber issues, adversaries, and threats, creating strategies and recommendations to improve the cyber resilience and maturity of those entities. He supported many high-level events such as the Super Bowl, state elections, inaugurations, and government officials lying in state. In addition to high-level events, Mike has organized, participated in, and successfully completed multiple cyber exercises in both states involving government entities, critical infrastructure private sector companies, and the National Guard.

Topics: Culture, Information Security
  • Sessions
10:00 - 10:50 AM

[1 CPE] Keeping Your Campus Safe with Gunshot Detection and Response

  Presented by iT1 Source & EAGL Technology

Today’s unfortunate incidents require a new mindset and improved processes to better address workplace threats. Join us to learn about gunshot technology, developed by the Department of Energy, and using technology to drive a faster response. This session will cover gunshot detection, customizing response actions such as 911 emergency dispatch, email/text notifications, locking access-controlled doors, PA broadcasts, and more.

11:00 - 11:50 AM

[1 CPE] How AI Can Think Like an Attacker

  Presented by Alissa Guevara, Cyber Security Technologist • Darktrace

In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks across all areas of their digital environment. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

Topics: Information Security
12:00 - 12:50 PM

[1 CPE] A Truly Statewide Strategy for Building the Collective Defense of Arizona

  Presented by ACTRA

As NATO says, an attack against one of us is an attack against all of us. Threat actors continue to victimize both government and business targets without regard to their affiliation or sector. Arizona's unique strategic partnerships allow it to combine public sector support and private sector ingenuity to break down silos and build a truly statewide community of collaborative cyber defenders.

Speakers:

Ryan Murray, Deputy Director & Interim State CISO, State of Arizona
Frank Grimmelmann, President & CEO, Arizona Cyber Threat Response Alliance

Ryan Murray joined the Arizona Department of Homeland Security in July 2021 and currently serves as the Deputy Director over Cyber Command and as the Interim Chief Information Security Officer for the State. He also previously served as the Chief Information Security Officer for the Arizona Department of Revenue for three and a half years. In his current role, Deputy Director Murray provides tactical and operational leadership for Cyber Command, and strategic planning, facilitation, and coordination of cybersecurity efforts throughout the State.

Frank J. Grimmelmann serves as President & CEO for the Arizona Cyber Threat Response Alliance (ACTRA), a non-profit entity that was developed collaboratively with the Arizona InfraGard Program, the FBI, USDHS and law enforcement, and independently launched in 2013 to enable its private/public sector member organizations across all critical sectors to enable themselves to respond to the escalating national cybersecurity threat.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Looking to the Future: Threat and Security Trends for 2023

  Presented by Christopher Fielder, Field Chief Technology Officer • Arctic Wolf

According to global leaders, last year’s concerns are still top of mind, but forward progress is being made. The skill shortage is still a present pain point for most, while cloud security continues to be a major source of concern and the number of breaches pace steadily upwards.

Worry has now become action as organizations evaluate their weaknesses, increase budget plans, and proactively work against rising cyber threats. Join Arctic Wolf Field CTO Christopher Fielder as we review our research into the top threats and security trends businesses are facing along with predictions and guidance for the future.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] MDR Services: Enhancing Compliance and Mitigating Cyber Insurance Risks

  Presented by Mitch Gurick, Sr Cybersecurity Specialist • AT&T Business

Join us for a captivating 50-minute discussion on how organizations effectively collaborate with MDR services to secure their business. Discover how MDR services not only help organizations meet critical cyber controls for insurability and superior coverage offerings but also elevate overall protection, significantly reducing the risk of costly data breaches and the financial burdens associated with major incidents.

Whether you're a small company with limited IT resources or a large enterprise with an in-house SOC group, MDR services are indispensable across all sectors. In an ever-evolving threat landscape, where attackers utilize stolen credentials, security misconfigurations, and legitimate IT tools to bypass defenses, technology alone cannot thwart every attack. Experience the power of 24x7 expert monitoring and response provided by skilled security operations professionals, as we explore how MDR services deliver round-the-clock protection, a feat that is often unattainable for most organizations independently.

Don't miss out on this enlightening discussion as we delve into the growing reliance on MDR providers to effectively combat sophisticated adversaries and safeguard your business.

Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Brenda Bergman-Niehaus
Manager, Information Security
American Express

Scott Campbell
Chief Information Security & Privacy Officer
City of Tempe, AZ

Don Clariza
Sr Lead Control Management Officer
Wells Fargo

Pamela Davis
Cyber Security Threat Intelligence
Southwest Airlines

Rich Donaldson
Information Security Officer
AZ Dept of Economic Security

Daniel Estrella
Sr Information System Security Officer
Raytheon

Rachel Evans
Sr IT Project Manager
Salt River Pima-Maricopa Indian Community

John Finnan
Director, Payment Cryptography Services
American Express

Anthony Flot
Chief Technology Officer
AZ Health Care Cost Containment System

George Gerardo
Director, Information Technology
West-MEC

Cody Graham
Director, Information Technology
Golfland Entertainment Centers

Ryan Gruver
Director, Information Technology
Banner Health

Luke Guillow
Manager, Information Technology
ReBath LLC

Kelly Hughes
Sr Manager, BC Enterprise Risk PMO
Avnet

Stephanie Inners
Manager, IT & Systems
R. E. Darling Co., Inc.

John Kullman
Sr Manager, Network
Yuma County, AZ

Michael Leff
Manager, Information Technology
Cutter Aviation

Robert Loy
Director, Technology Programs
Grand Canyon University

Tom Magrini
Assistant Chief Information Officer
City of Phoenix, AZ

Mike Manrod
Chief Information Security Officer
Grand Canyon Education

Randall Mitchell
Vice President, Information Systems
Arizona Musicfest

Chad Palmer
Director, Area IT
CommonSpirit Health

Nick Petrishin
Manager, IT Service and Performance
Arizona Public Service

Steven Porter
Manager, Information Technology
Alpha Geotechnical and Materials

Carolina Ramirez
Sr Manager, Information Security Risk
Silicon Valley Bank

Jerry Simpson
Deputy CIO
City of Phoenix, AZ

Steve Smith
Sr Information Security Officer
Glendale Community College

John Stark
Information Security Officer
AZ Dept of Health Services

Keith Stocks
VP, Third Party Cyber Risk Management
State Street

Beverly Stokes
Sr Manager, Information Security Risk
Silicon Valley Bank

Joanne Storbeck
Manager, Global BC Planning
Freeport McMoRan

Isaiah Washington
AVP, Chief Information Officer
Glendale Community College

David Williams
Director, Application Development
Lifewell

Joshua Wycoff
Manager, IT Security
Carlisle Companies Incorporated

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Hitachi Vantara

Hitachi Vantara

Hitachi Vantara
Hitachi Vantara helps enterprises create and derive value from their data. Its solutions include best-in-class data management, IT infrastructure and analytics products, IoT solutions and Smart Spaces technologies for a broad range of industries.
Visit Website

SILVER SPONSORS

Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
AT&T Business

AT&T Business

AT&T Business
Find the right solution for your business from AT&T. Offering the latest business phones, data plans, IoT, Internet and Networking.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
Illumio

Illumio

Illumio
Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes how workloads and devices are communicating, creates granular segmentation policies which only allow necessary communication, and automatically isolates ransomware and breaches. Assume breach. Minimize impact. Increase resilience.
Visit Website
iT1 Source

iT1 Source

iT1 Source
Since 2003, iT1 Source has provided a wide range of IT solutions –– from big data and communications to online support and virtualization.
Visit Website
Novacoast

Novacoast

Novacoast
Novacoast is an international cybersecurity company specializing in IT services and software development. With a 28-year history in the industry, Novacoast has built and maintains IT security solutions for some of the world’s largest private and public organizations. Our team is comprised of hundreds of specialists with backgrounds in IT advisory, development and engineering, and managed services. Together, we’re committed to identifying unique ways to improve the productivity and security posture of our customers.
Visit Website
Red Siege

Red Siege

Red Siege
Red Siege is one of the most trusted information security consulting firms in the industry that concentrates on the latest threats to organizations today. Red Siege performs in-depth analysis, determine organization/business risk, and finds the vulnerabilities before the bad guys do. The Red Siege team of trained, qualified, and experienced information security experts is led by one of the most recognized names in the industry, our CEO Tim Medin.
Visit Website
Sonatype

Sonatype

Sonatype
Sonatype is the developer-friendly full-spectrum software supply chain management platform that helps organizations and software developers.
Visit Website

BRONZE SPONSORS

11:11 Systems

11:11 Systems

11:11 Systems
11:11 Systems is creating a new model delivering the power of "Everything Connected" in connectivity, cloud, and security solutions for customers and partners.
Visit Website
BlackBerry

BlackBerry

BlackBerry
BlackBerry Cybersecurity is a leader in endpoint security, endpoint management, encryption, and embedded systems, protecting enterprises and governments around the world. Our end-to-end approach is deeply rooted in Cylance® AI and machine learning, providing continuous preventative protection, detection, and instant response. We extend protection for your organization against current and future cyberthreats by combining network and endpoint telemetry and by delivering innovative solutions in the areas of cybersecurity, safety, and data privacy.
Visit Website
Critical Start

Critical Start

Critical Start
Critical Start Managed Cyber Risk Reduction solutions ensure continuous security monitoring and mitigation, delivering robust protection against threats. With our platform’s maturity assessments, event analytics, response capabilities, and a team of expert risk mitigators, achieve the highest level of cyber risk reduction and increase confidence in attaining desired security maturity.
Visit Website
Expedient

Expedient

Expedient
Expedient helps companies transform their IT operations through award-winning cloud solutions and managed services including disaster recovery, security and compliance, and more.
Visit Website
Extreme Networks

Extreme Networks

Extreme Networks
Extreme Networks, Inc. (EXTR) delivers software-driven networking solutions that help IT departments everywhere deliver the ultimate business outcome: stronger connections with customers, partners and employees.
Visit Website
FNTS

FNTS

FNTS
FNTS is a trusted multi-cloud and managed IT services provider with a proven 25-year history supporting mainframe environments and a wide range of operating systems, including Windows, Linux, Unix AIX and iSeries. We also provide elevated layered security solutions to industries with strict regulations and compliance requirements.
Visit Website
Optiv

Optiv

Optiv
Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential.
Visit Website
Technology Source

Technology Source

Technology Source
With access to over 500 service providers, Technology Source works alongside IT departments to create best-in-breed solutions that include Managed IT Services—including Cybersecurity, Telecom Services and Mobility Services. Our primary objective is to reduce operational expenses, improve efficiencies and deliver an outstanding customer experience for our client partners.
Visit Website
VLCM

VLCM

VLCM
VLCM has been in business for over thirty years, and in that time, we’ve helped thousands of customers throughout the Rocky Mountain West find the proper solutions for their IT needs.
Visit Website

EXHIBITORS & ASSOCIATIONS

ACP Phoenix

ACP Phoenix

ACP Phoenix
ACP is a professional organization that provides a forum for the exchange of experiences and information for business continuity leaders throughout a network of local Chapters.
Visit Website
ACTRA

ACTRA

ACTRA
ACTRA serves as the hub for collaborative information sharing, where partners from industry, government, academia, law enforcement and intelligence come together, to respond to cyber threats, protecting our nation’s security interests.
Visit Website
Arizona Technology Council

Arizona Technology Council

Arizona Technology Council
The Arizona Technology Council is the driving force behind making our state the fastest growing technology hub in the nation; connecting and empowering Arizona’s technology community.
Visit Website
ARMA Arizona

ARMA Arizona

ARMA Arizona
The mission of ARMA International is to educate, advocate, and provide resources that enable professionals to manage information as a critical element of organizational operations and governance.
Visit Website
ASIS Phoenix

ASIS Phoenix

ASIS Phoenix
ASIS International is dedicated to increasing the effectiveness and productivity of security professionals by developing educational programs and materials that address broad security interests as well as specific security topic areas.
Visit Website
Axelliant

Axelliant

Axelliant
Axelliant design, deploy, implement, and manage advanced IT solutions and services with agility and responsiveness through the entire solution delivery process. Axelliant is there to guide customers on their personalized journey to success.
Visit Website
CDW

CDW

CDW
With full-stack expertise, CDW helps you design, orchestrate and manage technologies that drive business success.
Visit Website
Commvault

Commvault

Commvault
Commvault is a worldwide leader in delivering data readiness. Commvault's backup and recovery software enables you to protect, manage, and use your data, while managing it in a consistent, compliant way.
Visit Website
EAGL Technology

EAGL Technology

EAGL Technology
EAGL Technology, Inc. is an experienced security equipment manufacturer, specializing in gunshot detection systems and producing solutions that address today’s real-world security concerns.
Visit Website
Entrust

Entrust

Entrust
Entrust’s identity and data security solutions enable the Zero Trust maturity journey needed to help protect your organization, and we deliver convenient, secure digital interactions for your customers and citizens.
Visit Website
ESET

ESET

ESET
For more than 30 years, ESET® has been developing industry-leading IT security software and services to protect businesses, critical infrastructure, and consumers worldwide.
Visit Website
HOLMANS USA

HOLMANS USA

HOLMANS USA
HOLMANS USA is leading provider of technology to federal, state, education, and commercial markets Specializing in Solutions for Data Center, Desktop Client, Printing, Mobility and more. With our national sales and service centers, dedicated inventory, customized eCommerce solutions, assets management, HOLMANS USA has been helping clients efficiently achieve their business goals for over 60 years.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
InfraGard Arizona

InfraGard Arizona

InfraGard Arizona
Arizona InfraGard’s Mission is to help protect Arizona’s infrastructure by supporting the priorities of the FBI to cultivate partnerships with public and private sectors through the sharing of actionable information,training and educational events.
Visit Website
ISACA Phoenix

ISACA Phoenix

ISACA Phoenix
The purpose of the ISACA Phoenix Chapter is to promote the education of individuals for the improvement and development of their capabilities relating to the auditing of and/or management consulting in the field of Information Systems audit and control.
Visit Website
ISC2 Phoenix

ISC2 Phoenix

ISC2 Phoenix
The Mission of ISC2 Phoenix is to provide its members, as well as other security professionals, the opportunity to network, share knowledge, exchange resources, engage in public service activities, and mentor aspiring information security professionals.
Visit Website
ISSA Phoenix

ISSA Phoenix

ISSA Phoenix
The mission of the Phoenix ISSA Chapter is to provide a forum for the education of information security to its members through presentations and open discussions on topics important to the members and the information security industry.
Visit Website
Neal Networks

Neal Networks

Neal Networks
We help businesses cut costs and upgrade voice and data networks. We will review your telecom/IT expenses, contracts, auto-renew language, etc to find better contract options, products, and vendors. Account rep changes, contract policy changes, grandfathered products, and lack of motivation by carriers/vendors to reduce your cost almost guarantee you are overspending.
Visit Website
Partner One IT

Partner One IT

Partner One IT
Partner One IT is a VAR and MSP and provides best-in-class solutions and pricing for IT network hardware, software, cloud and services as well as asset disposition and staff augmentation. Partner One IT also offers expertise for on-premise IT services and support, including cabling projects, security systems, network configuration, assessments and repairs as well as cyber-security IP assessments and solutions.
Visit Website
PMI Phoenix

PMI Phoenix

PMI Phoenix
Project Management Institute (PMI) is the world's leading not-for-profit professional membership association for the project, program and portfolio management profession.
Visit Website
SDSUG

SDSUG

SDSUG
SDSUG is a group of information technology professionals in the Phoenix area dedicated to the security of our digital systems. We meet quarterly to discuss security issues, tech trends, and share our successes and failures so we can learn from each other.
Visit Website
SIM Arizona

SIM Arizona

SIM Arizona
SIM Arizona is the premier IT leadership association in Arizona. We offer a collaborative environment where members can learn about technology trends and innovations, build relationships, grow their careers, and give back to the community.
Visit Website
WiCyS Phoenix

WiCyS Phoenix

WiCyS Phoenix
Women in CyberSecurity is the premier organization with international reach dedicated to bringing together women in cybersecurity from academia, research and industry to share knowledge, experience, networking and mentoring.
Visit Website

Interested in becoming part of our next Phoenix event?

CONTACT US FOR INFO

Phoenix

Westin Kierland Resort
Grand Ballroom
6902 E. Greenway Parkway
Scottsdale, AZ 85245

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.