F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Sacramento 2019 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

June 26th, 2019
8:30am – 4:30pm

Hyatt Regency Sacramento
Regency Ballroom
1209 L Street
Sacramento, CA 95814

Directions & Parking

KEYNOTE: Quantification of Information Security Risk and Assessing Financial Impact

  Presented by Tolgay Kizilelma, Ph.D. • CISO at UC, Merced

Seminar Schedule

VIEW FLOORPLAN
  • Theater One
  • Theater Two
  • Theater Three
  • AM Sessions
  • PM Sessions
  • Keynote
9:00 - 9:50 AM

Security Automation in the Cloud

  Presented by Trend Micro

Cloud Computing brings greater simplicity around provisioning and deployment. The challenge is how to properly apply security without creating complexity.

With automation, one can use traditional technical controls to provide comprehensive coverage. This approach is not simply paying "lip service" to compliance requirements.

In this session we will discuss the drivers for such automation and look at what is traditionally considered detective controls in a preventative way.

Topics: Information Security
10:00 - 10:50 AM

Welcome to the New Age of Converged Secondary and Primary Storage

  Presented by StorageCraft

Managing storage continues to be complex, and often expensive. Something needs to change, and it certainly won't be a dramatic increase in staffing. Fortunately, object storage is the answer. By eliminating the use of legacy RAID, object storage, can be the foundation for a scale-out converged storage solution that solves both data protection and primary storage challenges. Want to recover a multi-TB VM in less than a second? No problem. Want to protect files from ransomware? No problem. Need an enterprise file serving, archiving, or virtual server storage solution? No Problem. Attend this session to learn how object storage is changing the landscape for IT admin and the technology of the future.

Topics: Data Storage
11:00 - 11:50 AM

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today's businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Topics: Information Security
12:10 - 12:45 PM

Cloud Security Myths Busted!

  Presented by Keson Khieu • Cyber Security Strategist

Cloud promises scaled computing at great power, for no time and effort. Security is included, right? Wrong! This talk demystifies Cloud Security by busting the four most common myths. It also offers a clear view of what cloud security is, and how to properly protect what's in the cloud. Don't get caught in the deluge of hacks without proper cloud security. Bring your questions for this interactive discussion with a leading local IT Security end-user that has been through the same challenges you are facing.

Topics: Information Security
1:00 - 1:50 PM

Changing Culture: Turning Adversaries into Allies

  Moderated by INTERFACE Advisory Council

It is often said that the human element is the biggest challenge when it comes to cyber security. In your office, you have so many users on your network that must be part of the solution. IT departments are often facing challenges in forging positive relationships with users. What are the approaches that help? There are ways to encourage positive relationships that will help change the culture of a company. Join the INTERFACE-Sacramento Advisory Council to get firsthand experience on what you can do to improve this dynamic. Bring your questions for this panel discussion to help create more allies in your office.

Panelists:

  • Adam German • CISO - California State Controller's Office
  • Tony Thomas • Director, Technology - Merced Union High School District
  • Christopher Geraghty • Associate VP, Enterprise Architecture - Synchrony Financial
  • Maisha Dottery • Chief Strategist - California State Treasurer's Office
2:00 - 2:50 PM

The Current Malware Threat Landscape & Enterprise Grade Remediation

  Presented by Malwarebytes

Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.

This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.

Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.

Topics: Information Security
Tolgay Kizilelma, Ph.D.Tolgay Kizilelma, Ph.D.CISO
3:00 - 3:50 PM

Quantification of Information Security Risk and Assessing Financial Impact

  Presented by Tolgay Kizilelma, Ph.D. • CISO at UC, Merced

Risk management is an integral part of information security programs. These programs usually are based on frameworks to improve the information security posture of an organization, and to reduce risk. Questions from decision-makers, such as "How much risk do we have? Which activities and gaps should be addressed and prioritized?" are not easy to answer. The presentation will focus on understanding, analyzing, and quantifying information security risk in financial terms, ensuring business-IT risk alignment resulting in informed and cost-effective business decisions.

A business-IT leader with twenty-five years of industry experience covering the whole IT spectrum. He is currently leading the cybersecurity efforts as the Chief Information Security Officer at University of California Merced. After almost two decades in private sector, Tolgay joined UC and initially worked for UC Agriculture and Natural Resources leading statewide infrastructure projects and help desk, network, systems, and information security teams. He is an advocate of lifelong learning and teaches graduate business analytics courses at Saint Mary's College of California. His current research interests are cybersecurity, business analytics, and educational IT programs. He has various industry certifications, an MBA, and PhD focusing on information security, quality, and patient safety.

  • AM Sessions
  • PM Sessions
9:00 - 9:50 AM

The Value of a Reliable CMDB & Practical Steps to Get There

  Presented by ServiceNow

Why have a CMDB? What is needed to build one? How do I maintain one? Why do CMDB projects sometimes fail or end up incomplete? What are the major best practices? What pitfalls should I avoid? The concept of CMDBs has been around for over a decade now. Some CMDB projects are successful. Some fail, are abandoned, or never really get there. This presentation first revisits the value of spending the effort to establish a functional and reliable CMDB. We then discuss a road map, practical best practices, pitfalls and do's and don'ts in order to successfully establish a reliable and maintainable CMDB.

10:00 - 10:50 AM

Achieving “Always On” IT Resilience

  Presented by Zerto

It's time to revolutionize your data protection strategy. Protecting and transforming your digital business for exceptional customer experiences requires an "always on" platform for disaster recovery, backup and cloud mobility. In this presentation, we'll discuss how to cost-effectively and swiftly manage both unplanned disruptions, including outages, ransomware attacks, and natural disasters, as well as planned events, such as moving to the cloud or data center consolidations.

Topics: Business Continuity / Disaster Recovery
11:00 - 11:50 AM

Security Automation in the Cloud

  Presented by Trend Micro

Cloud Computing brings greater simplicity around provisioning and deployment. The challenge is how to properly apply security without creating complexity.

With automation, one can use traditional technical controls to provide comprehensive coverage. This approach is not simply paying "lip service" to compliance requirements.

In this session we will discuss the drivers for such automation and look at what is traditionally considered detective controls in a preventative way.

Topics: Information Security
1:00 - 1:50 PM

Active Directory Security: Early Stage Attack Activities to Watch For

  Presented by STEALTHbits Technologies 

Attackers have demonstrated a consistent and ongoing ability to obtain access to workstations inside the network boundary through phishing and other web and email attacks. From here, attackers set their sights on gaining control of Active Directory as a means to an end; compromising Active Directory is an easy way to gain access to all critical corporate data and resources. Darin will discuss two early stage attack activities: LDAP reconnaissance and Password Spraying – that allow attackers to move laterally inside your AD environment. Detection strategies and mitigation steps will also be explained.

Topics: Information Security
2:00 - 2:50 PM

Welcome to the New Age of Converged Secondary and Primary Storage

  Presented by StorageCraft

Managing storage continues to be complex, and often expensive. Something needs to change, and it certainly won't be a dramatic increase in staffing. Fortunately, object storage is the answer. By eliminating the use of legacy RAID, object storage, can be the foundation for a scale-out converged storage solution that solves both data protection and primary storage challenges. Want to recover a multi-TB VM in less than a second? No problem. Want to protect files from ransomware? No problem. Need an enterprise file serving, archiving, or virtual server storage solution? No Problem. Attend this session to learn how object storage is changing the landscape for IT admin and the technology of the future.

Topics: Data Storage
  • AM Sessions
9:00 - 9:50 AM

Exploitation of IT Vulnerabilities is Escalating

  Presented by Quest Software

Cybercriminals are savvier than ever. They understand that IT complexities create serious vulnerabilities, and these criminals are continually developing new ways to breach your organization's boundaries. That is why a proactive, unified endpoint management (UEM) strategy should be part of your organization's core business strategy.

Topics: Information Security, Strategic Management
10:00 - 10:50 AM

How Security Leaders Gain Trust in the Boardroom

  Presented by Kudelski Security

Security Leaders need a solid and comprehensive approach in communicating their cybersecurity programs. Kudelski Security surveyed CISOs, CSOs, and CIOs about communicating their cybersecurity program with their Board of Directors. The collective responses provide insight into what interests boards the most, suggested strategies and metrics that resonate when answering the board’s most challenging questions. A summary of the research will be provided to all participants in hardcopy booklet format.

Topics: Information Security, Strategic Management
11:00 - 11:50 AM

Hyperconverged Infrastructure: Do More with Less

  Presented by Scale Computing

Learn how organizations are doing more IT with less infrastructure and less complexity using hyperconverged infrastructure (HCI). The hyperconverged experts will discuss why virtualization doesn't need to be complex, inefficient, or costly when you adopt a modern, innovative architecture. The simplicity, scalability, and high availability of a turn-key infrastructure doesn't just lower costs, it frees up your own IT experts to work on new projects they haven't had time for in the past.

Topics: Data Center Technology, Infrastructure

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Jay Song
Chief Technology Officer
California Highway Patrol

David Brockmyer
Director of Information Security Operations
VSP Global

Mart Brown
Manager, Information Technology
Butte County Public Health

Frank Cardona
Manager, Tech Support & POS
Java City

Glen Carson
Chief Information Security Officer
California Natural Resources Agency

Tony Coronas
Director of Information Technology
Roebbelen Contracting, Inc

Maisha  Dottery
Chief Strategist
California State treasurers office

Mel Eelkema
Manager, Information Technology
Nor-Cal Beverage Co.

Chuck Forbes
Manager, Information Technology
Barnum & Celillo Electric, Inc

Adam German
Chief Information Security Officer
California State Controller’s office

Caleb Gibbs
Director, Information Technology
Weintraub Tobin

Bob Guarino
President
IIBA

Michael  Hull
IT Support Manager
HDR Inc.

Ren Johnson
VP of Information Technology
Acclamation Insurance Management Services (AIMS)

Keson Khieu
Information Security Officer
State of California

Ashish Kumar
Information Security Officer
CA Housing Finance Agency

Doug Lee
Board Member
HDI

Laurel Nava
Board Member
CETPA

Harry O’Laughlin
Chief Information Security Officer
California Department of Insurance

Michael  Reese
CISO
DSA Technologies

Charles Schaefer
Chief Strategy Officer
PMI

Christina Schauffel
Sr Information Security Advisor
Aetna

Peter Skibitzki
Director of Information Technology & Communications
Placer County Office of Education

Jay Song
Chief Technology Officer
California Highway Patrol

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

StorageCraft

StorageCraft

StorageCraft
Arcserve is a global top 5 data protection vendor with best-in-class solutions that manage, protect, and recover all data workloads, from SMB to enterprise and regardless of location or complexity. A 100% channel-centric organization, Arcserve has a presence in over 150 countries, with 19,000 channel partners and 235,000 customers.
Visit Website
Trend Micro

Trend Micro

Trend Micro
Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information.
Visit Website

SILVER SPONSORS

Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
Kudelski

Kudelski

Kudelski
Kudelski Security, a division of the Kudelski Group, is an innovative, independent providernof tailored cybersecurity solutions to enterprises and public sector institutions.
Visit Website
Malwarebytes

Malwarebytes

Malwarebytes
Malwarebytes protects workplace productivity. We secure all your endpoints so employees can connect confidently, from anywhere. We combine analytics-driven, multi-layer threat protection and industry-leading incident response to both simplify and strengthen overall cybersecurity. You and your team stay up and running, so you can remain focused on driving your business.
Visit Website
Quest Software

Quest Software

Quest Software
At Quest, we solve complex problems with simple solutions. Our philosophy is focused on great products, great service and being simple to do business with. We deliver technology that eliminates the need to choose between efficiency and effectiveness.
Visit Website
Scale Computing

Scale Computing

Scale Computing
Scale Computing's highly-automated edge infrastructure, virtualization platform, & hyperconverged solutions can handle all of your IT infrastructure needs.
Visit Website
ServiceNow

ServiceNow

ServiceNow
ServiceNow is changing the way people work. ServiceNow provides service management for every department in the enterprise including IT, human resources, facilities, field service and more.
Visit Website
STEALTHbits Technologies 

STEALTHbits Technologies 

STEALTHbits Technologies 
STEALTHbits Technologies is a cybersecurity software company focused on protecting an organization’s sensitive data and the credentials attackers use to steal that data through Active Directory Security and Data Access Governance.
Visit Website

BRONZE SPONSORS

Allstream

Allstream

Allstream
Allstream is a business communications provider in Canada and the United States. Allstream’s customers benefit from access to an expansive network of experts and a team focused on reliability & customer experience. Our services include voice, collaboration, and connectivity solutions.
Visit Website
Datrium

Datrium

Datrium
Datrium, the leader in automated cloud-native disaster recovery, enables enterprises to get failproof on-demand disaster recovery in the cloud, recover quickly from ransomware attacks and radically simplify data management. Datrium’s industry-leading disaster recovery (DR) with built-in backup is transforming the DR market, enabling enterprises to only pay for recovery when disaster strikes or for testing.
Visit Website
ESET

ESET

ESET
For more than 30 years, ESET® has been developing industry-leading IT security software and services to protect businesses, critical infrastructure, and consumers worldwide.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website
Western Digital

Western Digital

Western Digital
Western Digital creates environments for data to thrive, helping customers capture, preserve, access and transform an ever-increasing diversity of data.
Visit Website

EXHIBITORS & ASSOCIATIONS

AFCEA Sacramento

AFCEA Sacramento

AFCEA Sacramento
AFCEA is dedicated to increasing knowledge through the exploration of issues relevant to its members in information technology, communications, and electronics for the defense, homeland security and intelligence communities
Visit Website
apiNXT

apiNXT

apiNXT
apiNXT is a nonprofit organization started by experienced API community leaders who not only have a demonstrated passion for and commitment to advancing the API community but also a track record of effective results.
Visit Website
Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
ARMA Sacramento

ARMA Sacramento

ARMA Sacramento
ARMA International provides education and networking opportunities to information professionals to enable them to use skills and experience to leverage the value of records and knowledge as corporate assets and as contributors to organizational success.
Visit Website
Blue Karma Security

Blue Karma Security

Blue Karma Security
Blue Karma Security is a CMAS-certified Woman-Owned Small Business and Security Solutions Provider specializing in several areas of Cyber Security. We partner with only the best Security Solutions companies to meet your IT Security and Compliance goals. We provide Cloud-based, VMware, and On-Premise Solutions.
Visit Website
CITE

CITE

CITE
California IT in Education is a not-for-profit, association supporting the IT Professionals working in schools. Our members support hardware, software, help desk, data, WiFi, and installing and maintaining the infrastructure as technology used in schools.
Visit Website
Comcast GovEd Sacramento

Comcast GovEd Sacramento

Comcast GovEd Sacramento
Comcast Business has the largest IP network in the nation, serving small businesses through large enterprises. Technology offerings include Internet and Ethernet connectivity, voice solutions, and SD-WAN on ActiveCore(SM). Learn more at business.comcast.com/enterprise.
Visit Website
Commvault

Commvault

Commvault
Commvault is a worldwide leader in delivering data readiness. Commvault's backup and recovery software enables you to protect, manage, and use your data, while managing it in a consistent, compliant way.
Visit Website
DMD Systems Recovery

DMD Systems Recovery

DMD Systems Recovery
For over 20 years, DMD Systems Recovery has provided secure IT asset disposal services. Our Mission is to mitigate the risks associated with the disposition of sensitive data and retired electronics while maximizing the recovery of residual value.
Visit Website
Enterprise Networking Solutions

Enterprise Networking Solutions

Enterprise Networking Solutions
Enterprise Networking Solutions, Inc. develops and deploys proven reliable and scalable enterprise technology solutions. Expertise in virtualization, cloud integration, business continuity, disaster recovery, and migration/consolidation services.
Visit Website
Extreme Networks

Extreme Networks

Extreme Networks
Extreme Networks, Inc. (EXTR) delivers software-driven networking solutions that help IT departments everywhere deliver the ultimate business outcome: stronger connections with customers, partners and employees.
Visit Website
F5 Networks

F5 Networks

F5 Networks
F5 provides solutions for an application world. F5 helps organizations seamlessly scale cloud, data center, telecommunications, and software defined networking deployments to successfully deliver applications and services to anyone,anywhere, at any time.
Visit Website
GDG Sacramento

GDG Sacramento

GDG Sacramento
Google Developer Groups (GDGs) are for developers who are interested in Google's developer technology; everything from the Android, Chrome, Drive, and Google Cloud platforms, to product APIs like the Cast API,Maps API, and YouTube API.
Visit Website
HDI Sacramento

HDI Sacramento

HDI Sacramento
HDI is the professional association and certification body for the technical service and support industry. Facilitating collaboration and networking, HDI hosts acclaimed conferences and events, produces renowned publications and research.
Visit Website
HPE Juniper Networking

HPE Juniper Networking

HPE Juniper Networking
Juniper Networks is now part of HPE. Together, we're building industry-leading, secure, AI-native networks – purpose-built with and for AI. As AI and networking converge, we're driving a bold transformation across enterprises, service providers, and cloud operators.
Visit Website
IIBA Sacramento

IIBA Sacramento

IIBA Sacramento
The International Institute of Business Analysis (IIBA) Sacramento Valley Chapter (SVC) is dedicated to bringing the Business Analyst community in Sacramento valley together to help Grow, Connect, and Evolve the Business Analysis profession.
Visit Website
Infoblox

Infoblox

Infoblox
Infoblox unites networking and security to deliver unmatched performance and protection. Trusted by Fortune 100 companies and emerging innovators, we provide real-time visibility and control over who and what connects to your network, so your organization runs faster and stops threats earlier.
Visit Website
ISACA Sacramento

ISACA Sacramento

ISACA Sacramento
With more than 100,000 members in more than 180 countries, ISACA (www.isaca.org) is a recognized worldwide leader in IT governance, control, security and assurance.
Visit Website
ISSA Sacramento

ISSA Sacramento

ISSA Sacramento
ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.
Visit Website
Network Critical

Network Critical

Network Critical
Network Critical offers network TAPS and packet brokers that provide the packet-level access needed to deliver scale-out visibility across your entire dynamic network.
Visit Website
Netwrix

Netwrix

Netwrix
Netwrix provides IT auditing software that delivers complete visibility into IT infrastructure changes and data access, including who changed what, when and where each change was made, and who has access to what.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website
PMI Sacramento

PMI Sacramento

PMI Sacramento
Project Management Institute is the world's leading not-for-profit professional membership association for the project, program and portfolio management profession.
Visit Website
Questivity

Questivity

Questivity
Questivity is a full-service IT solutions firm providing IT Infrastructure Solutions and Services to its growing base of customers through partnerships with IT leaders to bring the best of breed solutions to our clients.
Visit Website
Wilson Electronics

Wilson Electronics

Wilson Electronics
Wilson Electronics manufactures cellular boosters to resolve poor coverage at home, at work or in your vehicle. FCC & Carrier approved solution for all US cell phone carriers. Expanding cost effective wireless network coverage to everyone, everywhere.
Visit Website

Interested in becoming part of our next Sacramento event?

CONTACT US FOR INFO

Sacramento

Hyatt Regency Sacramento
Regency Ballroom
1209 L Street
Sacramento, CA 95814

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.