F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Phoenix 2024 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Phoenix EVENTS

AT A GLANCE

June 21st, 2024
8:30am – 4:30pm

Westin Kierland Resort
Herberger Ballroom
6902 E. Greenway Parkway
Scottsdale, AZ 85245

Directions & Parking

KEYNOTE: [1 CPE] AI: Friend or Foe? An Open Discussion With Your Colleagues

  Presented by the INTERFACE Advisory Council

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Theater Three
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] The Current Threat Landscape Requires a Unique Approach

  Presented by Eric Vanderbur, Global Solutions Architect • Forescout

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] The Future of AI-Enabled Data Platforms

  Presented by Ian Clatworthy, Global Director, Infrastructure Product Marketing • Hitachi Vantara

Removing the infrastructure silos and administration complexity around your application’s data gives you the flexibility to consume solutions and deliver total data freedom. Join us as we showcase the future of data storage as a single hybrid cloud platform for applications. Allowing you to consume the data services you need, where and when you need it! Offering a single data plane and control plane across block, file, object, and mainframe, with one common experience for administration, analytics, and automation.

Ian comes from a customer background in Formula 1 and World Rallying. Having a deep understanding of technology and its benefits he took his skills into technology sales and marketing with Dell and HDS. Today he leads Product Marketing for data infrastructure technologies at Hitachi Vantara.

Topics: Artificial Intelligence, Data Management
11:00 - 11:50 AM

[1 CPE] Cyber Resilience: Fortifying Your Defenses for the Digital Battlefield

  Presented by Brian Doty, Channel Development Manager • Kaseya & BlackPoint IT

The details of this presentation will be available soon. Please check back for updates!

The Global Leader in IT & Security Management: Kaseya's complete, integrated, and cost-effective platform is trusted by over 500,000 IT Professionals globally to manage and secure more than 300 million devices.

1:00 - 1:50 PM

[1 CPE] How AZ’s Collective Public/Private Defense Benefits Your Organization & the AZ Ecosystem

  Presented by Ryan Murray •  AZ DHS and Frank Grimmelmann • ACTRA

ACTRA, and the State of Arizona Department of Homeland Security, will share the objective evidence of how the entire State of Arizona, public sector, and private industry, is coming together to raise the bar for the collective defense of the community. Trust-driven collaborative integration of people, processes, and technology demonstrates the advances to be shared!

We’ll focus on the work being done to deploy defensive tools to ensure cybersecurity readiness, the sharing of actionable intelligence to ensure we all have visibility of the threats impacting our organizations, and even developing the cybersecurity workforce of tomorrow. Become part of the conversation and join us in the collaborative communication to better secure the entire state!

Speakers:
Ryan Murray, Deputy Director, Arizona Department of Homeland Security & CISO State of Arizona
Frank J. Grimmelmann, President & CEO, Arizona Cyber Threat Response Alliance, Inc. (ACTRA)

Ryan Murray joined the Arizona Department of Homeland Security in July 2021 and currently serves as the Deputy Director over Cyber Command and as the Interim Chief Information Security Officer for the State. He also previously served as the Chief Information Security Officer for the Arizona Department of Revenue for three and a half years. In his current role, Deputy Director Murray provides tactical and operational leadership for Cyber Command, and strategic planning, facilitation, and coordination of cybersecurity efforts throughout the State.

Frank J. Grimmelmann serves as President & CEO for the Arizona Cyber Threat Response Alliance (ACTRA), a non-profit entity that was developed collaboratively with the Arizona InfraGard Program, the FBI, USDHS, and law enforcement, and independently launched in 2013 to enable its private/public sector member organizations across all critical sectors to enable themselves to respond to the escalating national cybersecurity threat.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] The Human Factor: Quantifying Human Risk

  Presented by Sara Anstey, Director of Data Analytics and Risk  • Novacoast

This talk will explore the growing field of human risk management and quantification, diving into the next step in an organization's risk journey: quantifying people. We will discuss where the market is, how people are adopting it, and what organizations can gain from human risk management.

Join this session on the emerging and evolving field of human risk quantification, which aims to apply quantitative methods to assign risk scores to every employee at a company based on their actions and access. This space is very similar to where cyber risk quantification was about 4 years ago when there were a few start-ups in the market and a few active voices on LinkedIn advocating for the adoption of these practices. Now, human risk quantification is an organizational priority. Having done extensive research into where the players in the market are and how companies utilize these strategies, human risk quantification has become the next step of a risk journey for many companies. Over 80% of breaches involve the human element –– if organizations want to stop them, they need to understand how the people they employ affect their security posture.

Topics: Information Security, Strategic Management
The INTERFACE Advisory CouncilThe INTERFACE Advisory CouncilPanel Discussion
3:00 - 3:50 PM

[1 CPE] AI: Friend or Foe? An Open Discussion With Your Colleagues

  Presented by The INTERFACE Advisory Council

Artificial Intelligence has made a mark already and its use will only continue to expand. Are we fully prepared to embrace AI in our workplaces? Viewpoints differ on how widely AI should be used at this point. Commonly used applications and software now include AI capabilities as a part of their standard offerings. How is this governed in your company? Do you even have an AI policy drafted?

Join the INTERFACE Advisory Council for an open discussion on all things AI. We will cover the risks associated with using AI –– and the risk of NOT using it. What knowledge do you need right now? Bring your questions as we explore the starting points that every IT department needs to consider for an effective AI policy.

Panelists:

  • Mike Lettman, Senior Information Security Analyst, Tri Counties Bank
  • Mike Manrod, Chief Information Security Officer, Grand Canyon Education
  • Nick Petrishin, Manager, IT Service and Performance, Arizona Public Service
  • Lynne Pizzini, Vice President, IT Governance, Assurance, Tri Counties Bank
Topics: Artificial Intelligence
  • Sessions
9:00 - 9:50 AM

[1 CPE] Revolutionizing Customer Experience: The AI-Powered Contact Center

  Presented by Dallas Farruggia, Sr Sales, Solutions Engineer • 8x8 & BlackPoint IT

Dive into the capabilities of AI in transforming customer experience landscapes to drive better engagement, efficient processes, enhanced agent efficiency, and more impactful customer relationships.

Topics: Artificial Intelligence
10:00 - 10:50 AM

[1 CPE] Zero Trust for More than a More Secure Future

  Presented by Chad Haskell, Sr Solutions Architect • Barracuda & BlackPoint IT

Like many relatively new technologies, Zero Trust has a reputation for being complex, and difficult to configure and manage. But it’s clearly gaining traction. Gartner predicts that more than 60% of organizations will embrace zero trust as a starting place for security by 2025. Attend this information-packed session and get answers to all your questions about how it works, why you need it, and how many of you are already implementing it in one way or another. We’ll cover the stages of a successful Zero Trust implementation — seed, sprout, and bloom — and how easily you can use it to secure access to all your network resources, data, and applications.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Demystifying Microsoft Copilot: Preparing for Successful Deployment

  Presented by Wil Herrera, CTO & Alex Esterly, Sr Solutions Architect  • iT1 Source

This session will provide a comprehensive exploration of Copilot for Microsoft 365. Attendees will gain insights into maximizing their effectiveness along with how to deploy, ensuring successful integration into all aspects of your tasks and workflows while addressing ethical considerations and maximizing productivity.

Topics: Infrastructure
12:00 - 12:50 PM

[1 CPE] The Decarbonization of the Data Center

  Presented by Ian Clatworthy, Global Director, Infrastructure Product Marketing • Hitachi Vantara

Balancing the need for substantial data infrastructure with more eco-friendly policies should be top of all organizational to-do lists. Rather than a competition between corporations, these initiatives should be focused on the larger benefit of a healthier world. That’s why creating a specific data center decarbonization strategy will be key. This will range from improving the visibility and measurement of power usage, to actually reducing the carbon footprint of each operational layer. But where should organizations begin?

Ian comes from a customer background in Formula 1 and World Rallying. Having a deep understanding of technology and its benefits he took his skills into technology sales and marketing with Dell and HDS. Today he leads Product Marketing for data infrastructure technologies at Hitachi Vantara.

Topics: Data Center Technology, Strategic Management
1:00 - 1:50 PM

[1 CPE] Zero Trust Microsegmentation: It’s Easier Than You Think

  Presented by Ben Collar, Senior Systems Engineer • Illumio

Regardless of the sophistication of the ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you with simple steps to get started that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity
Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Opportunities & Risks for Industries: Generative AI Models

  Presented by Joe Vadakkan, President, Southwest Arizona Chapter • Cloud Security Alliance

Generative AI models can perform tasks that traditionally require creativity and human understanding. They learn patterns from existing data during training and can subsequently generate new content, such as texts, images, and music, that follow these patterns. Due to their versatility and generally high-quality results, they, on the one hand, represent an opportunity for digitalization. On the other hand, the use of generative AI models introduces novel IT security risks that need to be considered for a comprehensive analysis of the threat landscape in relation to IT security. We will be diving into risk analysis, measures, and operational models associated with utilizing Gen AI.

Topics: Artificial Intelligence
  • Sessions
9:00 - 9:50 AM

[1 CPE] Global Insights on Identity Security Maturity: Why it Matters? Why Now?

  Presented by Brian Roberts, Sr Solutions Engineer • CyberArk

In our global survey of 1,500 identity-related security experts, we found only 9% of organizations have the highest level of maturity. These Transformative organizations have the most mature identity security programs as they strategically focus on four key tenets: tools, integration, automation, and continuous threat detection & response. As a result, these organizations significantly outperform their competition in driving business outcomes and reducing risk. Learn how you can mature your identity security program because the future of security starts with identity.

Key Session Takeaways:

  • Top challenges for identity security
  • The four tenets of identity security
  • How to take a holistic approach to identity security
  • Key considerations in evaluating identity security providers

Brian Roberts is a motivated, technically-minded individual with 12 years of solutions engineering experience ranging from backup and disaster recovery to identity security. He primarily focuses on Privilege Access Management and Least Privilege Enforcement with self-hosted and cloud assets.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Cybersecurity and Compliance For 2024

  Presented by Rob Wayt, Director of Governance, Risk, and Compliance • Structured

The cybersecurity regulatory compliance landscape has never been more complicated, and this presentation will provide information and updates to CMMC, GLBA, PCI, TSA, generative AI and security best practices. This discussion will focus on security solutions to these challenges, including penetration testing and zero trust implementations. Rob Wayt, Director of Governance, Risk, and Compliance at Structured will be the presenter.

Topics: Artificial Intelligence, Information Security
11:00 - 11:50 AM

[1 CPE] Modernizing Physical Security

  Presented by Verkada & Structured

In this session, we’ll look at the technologies at the forefront of enterprise building security. Connected security devices can provide users with real-time insights and a full picture of the health and safety of their environments. We’ll explore how to minimize security risks, workplace frustrations, and costly inefficiencies with best–in–class solutions that provide a scalable way to easily configure, monitor and respond to events from anywhere. Learn how modernizing your physical security can help you seamlessly safeguard the physical world –– without sacrificing privacy –– to operate safer, smarter buildings.

1:00 - 1:50 PM

[1 CPE] Rapid Growth of Unstructured Data Across Industries and the Challenge of Protecting It

  Presented by Paul Swanson, Account Executive, PLS NAS • Rubrik & Structured

In today’s digital economy, nearly every industry is finding that data is becoming increasingly critical to its core business success. Data enables innovation and discovery, powers advances in artificial intelligence and machine learning, and drives medical and earth-science breakthroughs. Most of the collective data fueling today’s technological and scientific advances consists of unstructured data files – trillions of them. For effective stewardship of both infrastructure and data, IT needs to have insight into the depth and breadth of your organization’s unstructured datasets and the workflows that use them. Join this session for a discussion of the rapid growth of unstructured data across industries and the challenge of protecting it.

Topics: Data Management, Information Security
2:00 - 2:50 PM

[1 CPE] The Current Threat Landscape Requires a Unique Approach

  Presented by Eric Vanderbur, Global Solutions Architect • Forescout

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Chris Alejandro
Head of Compliance
Apriva

Scott Campbell
Chief Information Security and Privacy Officer
City of Tempe, AZ

Don Clariza
Sr Lead Control Management Officer
Wells Fargo

Pamela Davis
Cyber Security Threat Intelligence
Southwest Airlines

Daniel Estrella
Sr Information System Security Officer
Raytheon

Rachel Evans
Sr IT Project Manager
Salt River Pima–Maricopa Indian Community

John Finnan
Director, Payment Cryptography Services
American Express

Anthony Flot
Chief Technology Officer
AZ Health Care Cost Containment System

George Gerardo
Director, Information Technology
West-MEC

Cody Graham
Director, Information Technology
Golfland Entertainment Centers

Ryan Gruver
Director, Information Technology
Banner Health

Luke Guillow
Director, Information Technology
Commercial Properites Inc.

Kelly Hughes
Sr Manager, BC Enterprise Risk PMO
Avnet

Stephanie Inners
Manager, IT & Systems
R. E. Darling Co., Inc.

Mike Lettman
Sr Information Security Analyst
Tri Counties Bank

Tom Magrini
Assistant Chief Information Officer
City of Phoenix, AZ

Mike Manrod
Chief Information Security Officer
Grand Canyon Education

Randall Mitchell
Vice President, Information Systems
Arizona Musicfest

Patrick O’Keefe
Head of Global Cybersecurity and Risk Management
Circle K

Chad Palmer
Director, Area Information Technology
CommonSpirit Health

Nick Petrishin
Manager, IT Service and Performance
Arizona Public Service

Lynne Pizzini
Vice President, IT Governance, Assurance
Tri Counties Bank

Gustavo Prudencio
Manager, Information Technology
Alpha Geotechnical & Materials

Carolina Ramirez
Sr Manager, Information Security Risk
Silicon Valley Bank

Catherine Rando
Vice President, Information Security
Del Norte Credit Union

Nati Shah
Vice President, Enterprise Data Solutions
Wells Fargo

Jerry Simpson
Deputy Chief Information Officer
City of Phoenix, AZ

John Stark
Information Security Officer
AZ Dept of Health Services

Keith Stocks
VP, Third Party Cyber Risk Management
State Street

Beverly Stokes
Sr Manager, Information Security Risk
Silicon Valley Bank

Joanne Storbeck
Director, Business Continuity Management
EMCOR Group, Inc.

Dana Suddarth
Manager, Information Security Compliance
Carvana

Duane Swizer
Vice President, Information Technology
Vertex Education

Ian Trollope
Deputy Chief Information Officer
City of Phoenix, AZ

Joshua Wycoff
Director, IT Security
Judicial Branch of Arizona

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

BlackPoint IT

BlackPoint IT

BlackPoint IT
Established in 1977, BlackPoint IT Services is a leading provider of comprehensive IT and Telecom Managed Services, catering to small and medium-sized businesses across the United States. Our commitment to excellence extends globally, with remote services offered internationally for our clients. Our diverse service offerings encompass Carrier, IT Networking, Telecom professional services, and project management, ensuring that our clients receive end-to-end support for their technology needs. At BlackPoint, we are dedicated to delivering tailored solutions that harness the power of current technologies, empowering our clients to achieve their business objectives both today and in the future. With a strong focus on innovation and customer satisfaction, we take pride in our ability to offer a wide range of services while maintaining a high level of expertise. Our team's collaborative approach and unwavering dedication to excellence make BlackPoint the ideal partner for businesses seeking cutting-edge IT and Telecom solutions.
Visit Website
Forescout

Forescout

Forescout
The only automated cybersecurity company that continuously identifies, protects and ensures the compliance of all managed and unmanaged connected assets – IT, IoT, IoMT and OT – so you can more effectively manage cyber risk and mitigate threats.
Visit Website
Hitachi Vantara

Hitachi Vantara

Hitachi Vantara
Hitachi Vantara helps enterprises create and derive value from their data. Its solutions include best-in-class data management, IT infrastructure and analytics products, IoT solutions and Smart Spaces technologies for a broad range of industries.
Visit Website
Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

CyberArk

CyberArk

CyberArk
Get the most complete Identity Security and Access Management Solutions that enable secure access across any device, anywhere, at just the right time.
Visit Website
Illumio

Illumio

Illumio
Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes how workloads and devices are communicating, creates granular segmentation policies which only allow necessary communication, and automatically isolates ransomware and breaches. Assume breach. Minimize impact. Increase resilience.
Visit Website
iT1 Source

iT1 Source

iT1 Source
Since 2003, iT1 Source has provided a wide range of IT solutions –– from big data and communications to online support and virtualization.
Visit Website
Novacoast

Novacoast

Novacoast
Novacoast is an international cybersecurity company specializing in IT services and software development. With a 28-year history in the industry, Novacoast has built and maintains IT security solutions for some of the world’s largest private and public organizations. Our team is comprised of hundreds of specialists with backgrounds in IT advisory, development and engineering, and managed services. Together, we’re committed to identifying unique ways to improve the productivity and security posture of our customers.
Visit Website

BRONZE SPONSORS

baramundi

baramundi

baramundi
baramundi Software offers efficient, secure, and cross-platform management of workstation environments. With over 20 years of UEM experience across the globe, over 4,000 customers benefit from our intuitive, single-interface platform.
Visit Website
Commvault

Commvault

Commvault
Commvault is a worldwide leader in delivering data readiness. Commvault's backup and recovery software enables you to protect, manage, and use your data, while managing it in a consistent, compliant way.
Visit Website
CompuNet

CompuNet

CompuNet
CompuNet is a leading U.S. information technology partner, headquartered in Boise, Idaho. The firm specializes in consultation, design and implementation services specifically tailored to solve business problems. With a best-in-class engineering staff and approach, CompuNet focuses on building lasting relationships that prioritize client satisfaction over sales through every step of the journey.
Visit Website
Critical Start

Critical Start

Critical Start
Critical Start Managed Cyber Risk Reduction solutions ensure continuous security monitoring and mitigation, delivering robust protection against threats. With our platform’s maturity assessments, event analytics, response capabilities, and a team of expert risk mitigators, achieve the highest level of cyber risk reduction and increase confidence in attaining desired security maturity.
Visit Website
ESET

ESET

ESET
For more than 30 years, ESET® has been developing industry-leading IT security software and services to protect businesses, critical infrastructure, and consumers worldwide.
Visit Website
Legrand

Legrand

Legrand
The industry-leading brands of Approved Networks Ortronics, Raritan, Server Technology, Starline and ZPE empower Legrand’s Data, Power & Control to produce innovative solutions for data centers, building networks, and facility infrastructures. Our division designs, manufactures, and markets world-class products for a more productive and sustainable future. The exceptional reliability of our technologies results from decades of proven performance and a dedication to research and development. For more information, please visit our website.
Visit Website
Nuvodia

Nuvodia

Nuvodia
Nuvodia is an award-winning Managed Services Provider with certified technology experts that have one mission – make your business better. Nuvodia proudly serves the IT support needs of businesses from Pacific Northwest to the Desert Southwest, and Radiology Informatics nationwide.
Visit Website
Optiv

Optiv

Optiv
Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential.
Visit Website
Schneider Electric

Schneider Electric

Schneider Electric
As a global specialist in energy management and automation with operations in more than 100 countries, we offer integrated energy solutions across multiple market segments.
Visit Website
Semperis

Semperis

Semperis
Semperis is the industry's most comprehensive Active Directory security and recovery platform, protecting hybrid AD environments from identity-based attacks.
Visit Website
VLCM

VLCM

VLCM
VLCM has been in business for over thirty years, and in that time, we’ve helped thousands of customers throughout the Rocky Mountain West find the proper solutions for their IT needs.
Visit Website

EXHIBITORS & ASSOCIATIONS

8x8, Inc.

8x8, Inc.

8x8, Inc.
8×8 is transforming the future of business communications as a leading Experience Communications as a Service (XCaaS) provider. 8×8 XCaaS brings together customer and employee experience to deliver business agility. It’s the only integrated platform for contact center, voice, video, chat, and APIs that addresses today’s dynamic, critical workplace requirements. Unlike competitors, the 8×8 Experience Communications Platform enables company-wide collaboration, unified administration, shared integrations, and cross-platform AI and analytics through the industry’s only 99.999% financially back, platform-wide service level agreement (SLA). Unlike multi-vendor environments, 8×8 XCaaS provides platform-wide reliability, lowers cost, boosts employee productivity and customer engagement, and delivers intelligence through AI-powered experiences and insights.
Visit Website
ACP Phoenix

ACP Phoenix

ACP Phoenix
ACP is a professional organization that provides a forum for the exchange of experiences and information for business continuity leaders throughout a network of local Chapters.
Visit Website
ACTRA

ACTRA

ACTRA
ACTRA serves as the hub for collaborative information sharing, where partners from industry, government, academia, law enforcement and intelligence come together, to respond to cyber threats, protecting our nation’s security interests.
Visit Website
AFCOM Phoenix

AFCOM Phoenix

AFCOM Phoenix
AFCOM advances data center professionals by delivering comprehensive and vendor-neutral education and peer-to-peer networking to its members around the globe.
Visit Website
Barracuda

Barracuda

Barracuda
Barracuda Networks is the worldwide leader in Security, Application Delivery and Data Protection Solutions. More than 200,000 global customers trust Barracuda to safeguard their employees, data, and applications from a wide range of threats. Barracuda provides easy, comprehensive and affordable solutions for email protection, application protection, network protection and data protection. We are continually innovating to deliver tomorrow’s security technology, today.
Visit Website
CSA Southwest

CSA Southwest

CSA Southwest
To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.
Visit Website
Expedient

Expedient

Expedient
Expedient helps companies transform their IT operations through award-winning cloud solutions and managed services including disaster recovery, security and compliance, and more.
Visit Website
GoExceed

GoExceed

GoExceed
Solve(X) is a comprehensive data management solution designed specifically for mobility. Developed by GoExceed, this platform simplifies cellular expense and lifecycle management by merging data from all carriers into a unified portal. Solve(X) automates data management, streamlines wireless expense control, and enhances data integrity through AI-driven analytics—all without requiring changes to your existing carrier contracts or devices. It provides accurate, transparent records while uncovering opportunities for cost savings. Organizations gain real-time reporting, intuitive dashboards, and proactive alerts, empowering them to efficiently manage and optimize mobile operations. Seamlessly integrating into existing infrastructure, Solve(X) reduces unnecessary costs, simplifies mobile resource management, and safeguards mobile fleets. With GoExceed’s tailored solutions, businesses can increase productivity and control in today’s fast-paced digital environment.
Visit Website
HYPR

HYPR

HYPR
HYPR Identity Assurance empowers you to continuously detect, prevent, and eliminate identity-related risks for your workforce and customers.
Visit Website
InfraGard Arizona

InfraGard Arizona

InfraGard Arizona
Arizona InfraGard’s Mission is to help protect Arizona’s infrastructure by supporting the priorities of the FBI to cultivate partnerships with public and private sectors through the sharing of actionable information,training and educational events.
Visit Website
ISACA Phoenix

ISACA Phoenix

ISACA Phoenix
The purpose of the ISACA Phoenix Chapter is to promote the education of individuals for the improvement and development of their capabilities relating to the auditing of and/or management consulting in the field of Information Systems audit and control.
Visit Website
ISC2 Phoenix

ISC2 Phoenix

ISC2 Phoenix
The Mission of ISC2 Phoenix is to provide its members, as well as other security professionals, the opportunity to network, share knowledge, exchange resources, engage in public service activities, and mentor aspiring information security professionals.
Visit Website
ISSA Phoenix

ISSA Phoenix

ISSA Phoenix
The mission of the Phoenix ISSA Chapter is to provide a forum for the education of information security to its members through presentations and open discussions on topics important to the members and the information security industry.
Visit Website
Kaseya

Kaseya

Kaseya
The Global Leader in IT & Security Management: Our complete, integrated, and cost-effective platform is trusted by over 500,000 IT Professionals globally to manage and secure more than 300 million devices.
Visit Website
Lumen

Lumen

Lumen
Lumen connects the world. We digitally connect people, data and applications – quickly, securely and effortlessly. Everything we do at Lumen takes advantage of our network strength. From metro connectivity to long-haul data transport to our edge cloud, security, and managed service capabilities, we meet our customers’ needs today and as they build for tomorrow.
Visit Website
MegaplanIT

MegaplanIT

MegaplanIT
We offer a holistic set of cybersecurity and compliance solutions that are perfect for your company. Whether you need cyber threat detection, managed detection and response, achieve compliance with regulatory standards, or security penetration testing, Our team can help! MegaplanIT works with companies ranging from small to medium size businesses up to enterprise-level organizations.
Visit Website
MSPAA

MSPAA

MSPAA
The MSP Association of America (MSPAA) has been established with three primary missions, each of which follows a unique trajectory aimed at providing our clients, members, and students with a collaborative and informative pathway towards building a future for technology, business, and education.
Visit Website
Netop

Netop

Netop
Netop is transforming the secure remote access and control market by reducing downtime, improving reliability, and simplifying the complexity of modern remote device management without compromising security. With more than 40 years of experience supporting over 5 million devices in over 80 countries, Netop is the trusted choice for secure remote control.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website
Partner One IT

Partner One IT

Partner One IT
Partner One IT is a VAR and MSP and provides best-in-class solutions and pricing for IT network hardware, software, cloud and services as well as asset disposition and staff augmentation. Partner One IT also offers expertise for on-premise IT services and support, including cabling projects, security systems, network configuration, assessments and repairs as well as cyber-security IP assessments and solutions.
Visit Website
PMI Phoenix

PMI Phoenix

PMI Phoenix
Project Management Institute (PMI) is the world's leading not-for-profit professional membership association for the project, program and portfolio management profession.
Visit Website
Pondurance

Pondurance

Pondurance
Pondurance Managed Detection and Response is backed by authentic human intelligence. See how Pondurance MDR can help you manage threats.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website
SHI

SHI

SHI
From designing cloud, data center and end user computing strategies that support your hybrid working model to delivering the hardware and software you need to run it, SHI is your complete IT partner.
Visit Website
STEP CG

STEP CG

STEP CG
When you choose STEP CG, you get a trusted partner that understands your business strategy. We’re a leading managed IT, security and cloud services provider with award-winning, nationwide solutions. We support a full portfolio of networking, voice, security and professional service solutions. Our network technology solutions are powered by strategic engineers and best of breed technologies across a wide range of industries.
Visit Website
T-Mobile

T-Mobile

T-Mobile
Explore how T-Mobile understands how businesses work and has wireless solutions for all businesses. Join us and discover the benefits of T-Mobile’s network.
Visit Website
Utimaco

Utimaco

Utimaco
UTIMACO develops on-premises and cloud-based hardware security modules, solutions for key management, data protection and identity management as well as data intelligence solutions for regulated critical infrastructures and Public Warning Systems. UTIMACO is one of the world's leading manufacturers in its key market segments.
Visit Website
Verkada

Verkada

Verkada
Verkada provides cloud-managed security solutions—video surveillance, access control, alarms, and more—designed to simplify physical security and deliver real-time insights for safer, smarter buildings.
Visit Website
WatchGuard

WatchGuard

WatchGuard
For 25 years, WatchGuard Technologies has pioneered easy-to-deploy and easy to manage solutions. With industry-leading network security, secure Wi-Fi, MFA, Endpoint and network intelligence products and services for more than 250,000 companies. In a world where the cybersecurity landscape is constantly evolving, and new threats emerge each day, WatchGuard makes enterprise-grade cybersecurity technology accessible for every company.
Visit Website
WiCyS Phoenix

WiCyS Phoenix

WiCyS Phoenix
Women in CyberSecurity is the premier organization with international reach dedicated to bringing together women in cybersecurity from academia, research and industry to share knowledge, experience, networking and mentoring.
Visit Website

Interested in becoming part of our next Phoenix event?

CONTACT US FOR INFO

Phoenix

Westin Kierland Resort
Herberger Ballroom
6902 E. Greenway Parkway
Scottsdale, AZ 85245

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.