F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Reno 2019 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

May 1st, 2019
8:30am – 4:30pm

Atlantis Casino
Grand Ballroom
3800 S. Virginia Street
Reno, NV 89502

Directions & Parking

KEYNOTE: The “People Factor” of Digital Transformation

  Presented by Michael Dietrich • Chief Information Officer-State of Nevada

Seminar Schedule

VIEW FLOORPLAN
  • Theater One
  • Theater Two
  • AM Sessions
  • PM Sessions
  • Keynote
9:00 - 9:50 AM

Exploitation of IT Vulnerabilities is Escalating

  Presented by Quest Software

Cybercriminals are savvier than ever. They understand that IT complexities create serious vulnerabilities, and these criminals are continually developing new ways to breach your organization's boundaries. That is why a proactive, unified endpoint management (UEM) strategy should be part of your organization's core business strategy.

Topics: Information Security, Strategic Management
10:00 - 10:50 AM

Breaking Security Silos: How Better Integration Mitigates Cybercrime Expos

  Presented by Fortinet

Many solutions exist to solve particular security and technical issues in your network. But as solutions are added, complexity is increased as 'Silos' are created and visibility suffers. By breaking down these 'Security Silos,' you can get a better overall picture of what's transpiring on your network as well as reducing your overall attack surface. Key topics of Malware propagation, common threat vectors, encryption complications, and pragmatic approaches to defense will be presented to the attendee.

Topics: Information Security
11:00 - 11:50 AM

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today's businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Topics: Information Security
1:00 - 1:50 PM

Architecting the New SD-WAN Edge for the Cloud-first Enterprise

  Presented by Silver Peak Systems

Adoption of cloud services has driven enterprises to re-think WAN architecture. Architectures based on traditional, manually-programmed routers can't keep pace. A business-driven SD-WAN can provide secure direct connections from the branch to SaaS/IaaS across the internet, significantly increasing application performance resulting in a superior end-user QoEx (Quality of Experience). By integrating SD-WAN, WAN optimization, routing and security in a single unified platform, enterprises can simplify branch WAN edge architecture, accelerating time to value and dramatically reducing operational costs. From a centralized SD-WAN orchestrator, application priorities and QoS and security policies may be configured and assigned to automate traffic handling across the WAN. A single mouse click distributes SD-WAN configuration parameters to all sites, improving operational efficiency and minimizing the potential for human errors that can negatively impact application availability and enterprise security. This session will describe why SD-WAN adoption continues at a breakneck pace because of the user productivity, agility and cost savings benefits that a business-driven SD-WAN delivers.

Topics: Information Security, Infrastructure
2:00 - 2:50 PM

From IT to IoT: The Future is Now!

  Daniel Price • CEO of Breadware

The internet is growing and so are smart devices. Homes are flooded with IoT devices as is your office. By 2020, an estimated 95% of new electronic devices will be equipped with IoT technology. Are you prepared for this? What issues will arise with IoT products that come into your system? What vulnerabilities do you need to be aware of? Join Daniel Price, CEO of Breadware for a discussion on the IoT landscape. Daniel is the CEO and co-founder of Breadware. He brings a deep background of technology leadership and product design. He is passionate about the new opportunities that are being unlocked in our personal lives and our businesses in the era of intelligent, connected devices. Bring your questions as well so you can be prepared to handle the ever-changing landscape.

Michael DietrichMichael DietrichChief Information Officer- State of Nevada
3:00 - 3:50 PM

The “People Factor” of Digital Transformation

  Presented by Michael Dietrich • Chief Information Officer-State of Nevada

There is widespread adoption of Digital Transformation strategies in business, and as such technology roles changing. IT teams are becoming more visible, and IT leaders are moving from the back-office to having a seat at the business strategy planning table. Are you ready for this evolution? The increased visibility, accountability, and clarity of linkage between technology and business outcomes demands that technical leaders and staff evolve from pure technologists to business enablers. When implementing a technology solution, it is critically important to know "what done looks like" through the lens of the business and from the perspectives of the employees who will use, and benefit from, the solution. Nevada State CIO Michael Dietrich will speak to the importance of cultural change and adoption both within IT teams and at all levels of the business.

Michael joined the State of Nevada as CIO in early 2018 and immediately set out to change the tech culture by encouraging movement away from siloed solutions in favor of collective and unified enterprise technology decisions. Prior to public service, Michael spent 25 years in the private sector, leading large product development and engineering organizations, as well as merger and acquisition technical integration activities.

Michael's passion is finding the truly meaningful ways that technology can lead to better business outcomes and enhance our lives. To this end he is often heard using the phrase "Know what done looks like" which means seeing the end result from the point of view of the customer, regardless of their tech skill level, to ensure that a technology solution delivers what is needed seamlessly and effortlessly.

Michael is frequently quoted not only for his futurist outlook, but also on the interface of life and technology enhancements that are frictionless to the point of being invisible. "I think this ingrained philosophy has helped me be a better technology leader… no conversation about the benefits of any technical solution should be about the tech itself, but rather what it can do for us."

"The technology landscape is changing at an unprecedented rate. Traditional Information Technology — the implementation of office, productivity tools and connectivity— is being rapidly supplanted by Digital Transformation: the movement of all business and information resources and functions into the digital realm. The opportunity to apply my considerable experience and learnings to lead the digital transformation of Nevada is a dream come true. I am very excited about this role, and grateful for the opportunity to serve the State."

Michael has lived in Nevada most of his life. Since moving here over 30 years ago it is the place he calls home. When he is not immersed in the digital world, Michael enjoys all things two-wheeled, classic American muscle cars, and creating art and music.

  • AM Sessions
  • PM Sessions
9:00 - 9:50 AM

Vulnerability Mitigation Techniques for Securing the Enterprise

  Presented by Trend Micro

A primary component in securing and protecting your data, is ensuring technologies at all levels are patched and secured, as part of a Vulnerability Management program. According to US-CERT, an increasing number of new application vulnerabilities are found each year. More alarming a 2018 Frost & Sullivan report shows that the number of reported Zero Day vulnerabilities in 2017 has reached 1,522. Organizations must take steps to assess their organizational risk and implement a Patch/Vulnerability Management process to secure and protect their data and infrastructure.

10:00 - 10:50 AM

Achieving “Always On” IT Resilience

  Presented by Zerto

It's time to revolutionize your data protection strategy. Protecting and transforming your digital business for exceptional customer experiences requires an "always on" platform for disaster recovery, backup and cloud mobility. In this presentation, we'll discuss how to cost-effectively and swiftly manage both unplanned disruptions, including outages, ransomware attacks, and natural disasters, as well as planned events, such as moving to the cloud or data center consolidations.

Topics: Business Continuity / Disaster Recovery
11:00 - 11:50 AM

Show Me the Money: Challenges in IT Security Budgeting

  Presented by Bob Dehnhardt • CISO for State of Nevada

The details of this presentation will be available soon. Please check back for updates!

1:00 - 1:50 PM

Design Security into Your CI/CD Pipeline and Reduce Threats from Pre-Deployment to Runtime

  Presented by Trend Micro

Building better applications that meet the speed and demands of your business is what drives a successful DevOps practice. As business units migrate critical workloads to the cloud and grow their container adoption, trusted effective security controls that protect against a range of sophisticated threats and attacks need to be part of the automated integration and communication pipeline. You need the flexibility to work across hybrid and multi-cloud environments.

Whether it's contending with multiple point security tools or trying to squeeze into your organization's legacy IT security protocols, your DevOps shop requires the freedom to work effectively, minimize security disruptions, and adapt when InfoSec and compliance teams come calling.

2:00 - 2:50 PM

ITAD: The Perils & Potential of IT Asset Retirement

  Presented by DMD Systems Recovery

25 years of insight into how an organization can best approach the final stage of the IT Lifecycle.

Topics: Infrastructure

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Dave Archer
President
NCET

Bert Carroll
VP, CISO
EMPLOYERS

Daniel Erlendson
Sr. Server Administrator
University of Nevada, Reno

Carla Fair Wright
VP, Marketing
PMI

Brian  Foote
Chairman
ASIS

Jim Gaba
Director, Information Technology
Calm Computer Consulting

Zak Gulling
Chief Information Officer
Monarch Casino

Heather Hall
Manager, Information Security Program
EMPLOYERS Insurance

Dan Hammerling
Chief Information Security Officer
Peppermill Casinos Inc

Chris Ipsen
Assistant VP of IT
D R I

Rishma Khimiji
Director of Information Technology
City of Reno

Bob Leonard
Director, Information Technology
University of Nevada, Reno

Chris McClendon
Manager, IT Operations
University of Nevada, Reno

Todd Miknus
Manager, Information Technology
Clark/Sullivan Construction

Mike Nicks
Director, IT Operations
University of Nevada, Reno

Abraham Pearson
Director, Information Technology
Monarch Casino & Resort

James Pierce
Manager, Information Technology
Paterson Pacific Parchment Co.

Darrel Skubinna
Manager, Communications & IT
AECOM

Steve  Smith
Chief Information Officer
University of Nevada, Reno

Matthew Spears
Assistant Director of Information Technology
Multnomah University

James Underwood
Manager, IT Projects, Infra & Security
Carson City

Brian Wilcox
Chief Information Security Officer
BlackRidge Technology International

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Trend Micro

Trend Micro

Trend Micro
Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information.
Visit Website

SILVER SPONSORS

CrowdStrike

CrowdStrike

CrowdStrike
CrowdStrike® provides cloud-delivered endpoint and workload protection. Leveraging artificial intelligence (AI), the CrowdStrike Falcon® platform protects customers against cyberattacks on endpoints and workloads on or off the network by offering visibility and protection across the enterprise.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
DMD Systems Recovery

DMD Systems Recovery

DMD Systems Recovery
For over 20 years, DMD Systems Recovery has provided secure IT asset disposal services. Our Mission is to mitigate the risks associated with the disposition of sensitive data and retired electronics while maximizing the recovery of residual value.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface & the power to take on the ever-increasing performance requirements of the borderless network – today and into the future.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
Quest Software

Quest Software

Quest Software
At Quest, we solve complex problems with simple solutions. Our philosophy is focused on great products, great service and being simple to do business with. We deliver technology that eliminates the need to choose between efficiency and effectiveness.
Visit Website
Silver Peak

Silver Peak

Silver Peak
Silver Peak, recently acquired by HPE Aruba, delivers networking software that powers a self-driving wide area network (SD_WAN) that learns and adapts to requirements of the business to ensure the highest levels of end user and application performance.
Visit Website

BRONZE SPONSORS

Cisco

Cisco

Cisco
Cisco is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. Cisco delivers intelligent cybersecurity for the real world.
Visit Website
ESET

ESET

ESET
For more than 30 years, ESET® has been developing industry-leading IT security software and services to protect businesses, critical infrastructure, and consumers worldwide.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website
SentinelOne

SentinelOne

SentinelOne
SentinelOne is the future of Endpoint Protection. It unifies prevention, detection and response in a single platform driven by sophisticated machine learning and intelligent automation. It can adapt your defenses against the most advanced cyber-attacks.
Visit Website
Skybox Security

Skybox Security

Skybox Security
Skybox arms security teams with a powerful set of security management solutions that extract insight from security data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address vulnerabilities and threat exposures.
Visit Website

EXHIBITORS & ASSOCIATIONS

ARMA Reno

ARMA Reno

ARMA Reno
The Sierra Nevada Chapter of ARMA has members from large and small businesses, government agencies, insurance, finance, utilities, and more. We provide educational opportunities about today’s information management hot topics through regular meetings.
Visit Website
ASIS Northern Nevada

ASIS Northern Nevada

ASIS Northern Nevada
ASIS International is the preeminent organization for security professionals. ASIS is dedicated to increasing the effectiveness and productivity of security professionals by developing educational programs and materials that address broad security interests.
Visit Website
Commvault

Commvault

Commvault
Commvault is a worldwide leader in delivering data readiness. Commvault's backup and recovery software enables you to protect, manage, and use your data, while managing it in a consistent, compliant way.
Visit Website
InfraGard Reno

InfraGard Reno

InfraGard Reno
InfraGard is a partnership between the FBI and members of the private sector. The InfraGard program provides a vehicle for seamless public-private collaboration with government that expedites the timely exchange of information.
Visit Website
iXsystems

iXsystems

iXsystems
infrastructure and Private Clouds with Open Source economics.
Visit Website
NCET

NCET

NCET
NCET is an independent 501(c)(3) Nevada nonprofit organization whose programs include the NCET Small Business Expo, the NCET Tech Awards and the monthly Tech Wednesday, Biz Bite and Biz Cafe events.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website
PMI Northern Nevada

PMI Northern Nevada

PMI Northern Nevada
The Project Management Institute Northern Nevada Chapter focuses on advancing the capability of members to practice their profession of project management for the benefit of other project managers and the greater Northern Nevada community.
Visit Website
Proofpoint

Proofpoint

Proofpoint
Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.
Visit Website
Spectrum Business

Spectrum Business

Spectrum Business
Spectrum Business® delivers a complete portfolio of secure connectivity solutions for small and mid-market businesses and caters to the unique needs of large businesses, communications service providers and government entities. Our industry-leading experts align our products to the needs of each customer, drawing from our full suite of services including internet solutions over hybrid fiber-coax and 100% fiber, video and voice solutions including phone and mobile, as well as unified communications and managed services tailored for our mid-market and large enterprise customers.
Visit Website

Interested in becoming part of our next Reno event?

CONTACT US FOR INFO

Reno

Atlantis Casino
Grand Ballroom
3800 S. Virginia Street
Reno, NV 89502

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.