F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Virtual Sacramento 2020 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

December 15th, 2020
8:30am – 4:30pm

Virtual Conference
Multi-track seminars with Q&A
1-on-1 chat and networking
Hourly prize drawings

KEYNOTE: Digital Transformation in 2020 and Beyond: What’s Changed and What’s the Same

  Presented by Ann Dunkin • Chief Strategy & Innovation Officer, Dell Technologies

Seminar Schedule

  • Theater One
  • Theater Two
  • Sessions
  • Keynote
9:00 - 9:50 AM

Automating the Analyst

  Presented by Darktrace

Alongside the rise of today’s dynamic workforce, the speed and scale of sophisticated cyber-attacks is rapidly increasing. As the cybersecurity industry continues to endure an ongoing skills shortage, over-worked and under-resourced teams urgently need augmentation in order to defend against evolving, sophisticated threats.

For over three years, Darktrace experts have been working to meet this challenge, investigating whether they could teach AI to think like a cybersecurity analyst. It takes subtle, nuanced skills and implicit knowledge for an analyst to detect genuinely threatening activity, and the creation of the world-first Cyber AI Analyst took analyzing over one hundred of the world’s top threat analysts and complex machine learning algorithms.

Topics: Information Security
10:00 - 10:50 AM

Responsible Administration: The Admin Insider (Threat)

  Presented by One Identity

System Administrators are critical people to every organization. They design, build, and maintain all the parts and pieces that enable business, whether that’s retail, healthcare, or even a government agency. Ensuring sysadmin tasks are performed as securely as possible without hampering their ability to keep our business running is a delicate balance. These “insiders” not only know how the systems operate but have the credentials and privileges to operate them.

In this session, we will demonstrate an Active Directory breach using pass-the-hash and discuss ways to enable the System Administrators to operate in a way that not only protects the business from threats but also enables them to perform the intricate tasks they accomplish daily to keep business flowing under the covers.

Topics: Information Security, Strategic Management
11:00 - 11:50 AM

IT Interrupted: Best Practices in Disaster Recovery Planning

  Presented by Zerto

As IT application availability requirements continue to evolve, technology continues change to meet the new requirements. Join us as we discuss planning considerations for bringing your virtualized workloads into the next generation of IT resilience. You will learn about data center options to consider as part of your recovery strategy, business and technical trade-offs that will have to be made, capacity planning considerations, and testing approaches to that are possible that will optimize application up-time.

Topics: Business Continuity / Disaster Recovery
12:00 - 12:50 PM

2020 Aftermath and Beyond: Top Focus Areas on Cybersecurity, Privacy and Business Risk

  Presented by INTERFACE Advisory Council

2020 has been a transformational year. The COVID-19 pandemic certainly has made a big impact and expedited our business-IT efforts in different areas within our organizations. Cybersecurity, privacy, business risk received more attention from leadership. So, what happened and what is next? Join to our highly distinguished panel for an engaging discussion and walk away with valuable insight on top focus areas that every business executive needs to know and be prepared for in this coming year.

Moderated by:

Tolgay Kizilelma PhD. • Chief Information Security Officer, UC Merced

Panelists:

Jack Freund PhD. • Head of Cyber Risk Methodology, VisibleRisk

Jimmy Sanders • Head of Information Security, Netflix

Melissa Bendana • Information Security, Governance and Risk Management, Blue Shield of CA

Rand Morimoto PhD. • CISSP, Convergent Computing

Read more about our Moderator and Panelists >>

Topics: Information Security
1:00 - 1:50 PM

Own Your Data

  Presented by Commvault

Take ownership of data that already belongs to you.

Today organizations are storing their corporate data across multiple locations and platforms. On prem data centers, co-lo facilities, hybrid/multi cloud, SaaS and endpoint devices. With company data being so widely dispersed it’s difficult to know if you have full visibility, access and the flexibility to move data and workloads across locations and platforms. Protecting your data is only one component to maintaining ownership of your data. Along with having a robust data protection platform for on prem data you would also need the same level of control/protection of data assets that live outside the data center.

To truly own your data you must:

  • Protect and secure your data regardless of location or platform
  • Have access to it all
  • Have the tools to move your data/workloads where it makes sense for the business today and the flexibility adjust as business circumstances change. (On-Prem, hybrid/multi cloud, SaaS)
  • Have insight into your data, not only to understand the “what and where” but to provide governance and compliance

We will discuss what this all means and why you should rethink your approach to data management.

Topics: Information Security, Infrastructure
2:00 - 2:50 PM

Staying Secure While Working from Home

  Presented by Trend Micro

Working from home has become almost ubiquitous in these times of COVID-19. Quarantining your devices while away from the office is not an acceptable solution to the many risks that exist outside of your corporate network. Please join Trend Micro to discuss the many ways you can help ensure that working from home does not compromise the security posture of your organization.

Topics: Information Security
Ann DunkinAnn DunkinChief Strategy & Innovation Officer, Dell Technologies
3:00 - 3:50 PM

Digital Transformation in 2020 and Beyond: What’s Changed and What’s the Same

  Presented by Ann Dunkin • Chief Strategy & Innovation Officer, Dell Technologies

While our lives have changed dramatically this year, some things, like the need to have a highly capable, well trained and motived workforce haven’t changed. We’ll discuss how the pandemic accelerated government digital transformation and the challenges that still exist.

IT departments worked quickly and efficiently to support remote workforces. While productivity in many departments and industries has been effective, there have been adverse effects from remote working. While technology has been a driving force, it can’t replace some elements. Join Ann Dunkin for a look at the gaps that have been created and what lies ahead.

Ann Dunkin is Chief Strategy and Innovation Officer at Dell Technologies. Prior to joining Dell, Ms. Dunkin was the Chief Information Officer for the County of Santa Clara. Located in the heart of Silicon Valley, Santa Clara is the 15th largest county in the United States. Ms. Dunkin also served in the Obama Administration as the Chief Information Officer of the United States Environmental Protection Agency. Prior to her time in Washington D.C., she was the Chief Technology Officer for the Palo Alto Unified School District. Ms. Dunkin joined the School District after a long career at Hewlett Packard in a variety of leadership roles.

Ms. Dunkin is a published author, most recently of the book Industrial Digital Transformation, and sought-after speaker on the topics of technology modernization, digital services and organizational transformation. Throughout her career she has served on a wide range of professional boards and committees. She currently serves on the OptimEyes.io Board of Advisors, the WSC Board of Directors, the Agile Government Leaders (AGL) Board of Directors and the Georgia Tech President’s Advisory Board.

She holds a Master of Science and a Bachelor of Industrial Engineering, both from The Georgia Institute of Technology. She is a licensed professional engineer in the states of California and Washington.

Topics: Culture, Infrastructure, Strategic Management
  • Sessions
9:00 - 9:50 AM

SD-WAN Edge Transformation for the Cloud-First Enterprise

  Presented by Silver Peak

As cloud adoption and SD-WAN innovation hastens, global enterprises are transforming how they build and secure wide area networks. Leveraging automation, enterprises can deploy, connect and secure hundreds of sites per week, a feat not possible with a traditional device-centric approach.

During this session, we'll discuss how the unification of SD-WAN, WAN optimization, routing and security in a single, centrally orchestrated platform:

  • Delivers superior application performance wherever apps are hosted
  • Increases the quality of experience for end users and for IT
  • Simplifies branch WAN edge architecture
Topics: Data Storage, Infrastructure
10:00 - 10:50 AM

DRaaS for Everyone

  Presented by StorageCraft

Are you really ready for a data disaster? Learn more about how disaster recovery has changed the last couple years and how to put together a DR strategy for your business. Learn about a simple and economic DRaaS solution.

Topics: Data Storage
11:00 - 11:50 AM

Enduring from Home: COVID-19’s Impact on Business Security

  Presented by Malwarebytes

All of us are living in the new Work from Home normal caused by the rapid transmission and spread of COVID-19. While people everywhere have been worried about stopping the spread of COVID, malicious threats have not only continued to propagate but they have exploded in new and interesting ways. During this presentation we will review some of the more creative ways hackers have targeted business and individuals during the age of Work from Home and some ways to protect yourself from them.

Topics: Information Security
1:00 - 1:50 PM

Managing the New Team Dynamic in a Teleworking World

  Presented by INTERFACE Advisory Council

Migrating data to the cloud has been a transition many years in the making. With the move to teleworking in 2020, many organizations have sped up their cloud usage out of necessity. Many new security challenges have come from this. In addition, monitoring productivity of staff has been difficult. Managing all team dynamics has brought questions of effective policies and procedures.

Join the INTERFACE-Sacramento Advisory Council for a discussion of these topics and more. We will present practical suggestions in managing your cloud providers to allow maximum work efficiency while also meeting your cyber security needs.

Panelists:
Keson Khieu • Chief Information Officer, Emergency Medical Services Authority
Maisha Dottery • Chief Technology Strategist, California State Treasurers Office
Tony Coronas • Director of Information Technology, Roebbelen Contracting, Inc

Topics: Culture, Infrastructure
2:00 - 2:50 PM

DRaaS for Everyone

  Presented by StorageCraft

Are you really ready for a data disaster? Learn more about how disaster recovery has changed the last couple years and how to put together a DR strategy for your business. Learn about a simple and economic DRaaS solution.

Topics: Data Storage

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Nick Brown
Manager, Information Technology
Cuenca & Associates

Glen Carson
Chief Information Security Officer
California Natural Resources Agency

Tony Coronas
Director of Information Technology
Roebbelen Contracting, Inc

Maisha Dottery
Chief Technology Strategist
California State Treasurers office

Mel Eelkema
Manager, Information Technology
Nor-Cal Beverage Co.

Adam German
Chief Information Security Officer
California State Controller’s office

Jon Henry
Deputy Director, IT
El Dorado County

Michael Hull
IT Support Manager
HDR Inc.

Ren Johnson
VP of Information Technology
Acclamation Insurance Management Services (AIMS)

Keson Khieu
Chief Information Officer
Emergency Medical Services Authority

Tolgay Kizilelma
Chief Information Security Officer
University of California, Merced

Ashish Kumar
Information Security Officer
CA Housing Finance Agency

Jose Lopez
Manager, Risk & Privacy
Vision Service Plan

Minh Nguyen
Chief Information Security Officer
Cedaron Medical

Harry O’Laughlin
Chief Information Security Officer
California Department of Insurance

Brian Olson
Director, IT Security
Envolve Pharmacy Solutions

Michael Reese
Chief Information Security Officer
DSA Technologies

Christy Schauffel
Sr Information Security Advisor
Aetna

Ajay Wadhwa
Chief Information Security Officer
CA State Compensation Insurance

Michael Yee
VP, Information Technology
Mikuni Restaurant Group

Darryl Young
Assistant Deputy Director & CTO
CA Lottery

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

StorageCraft

StorageCraft

StorageCraft
Arcserve is a global top 5 data protection vendor with best-in-class solutions that manage, protect, and recover all data workloads, from SMB to enterprise and regardless of location or complexity. A 100% channel-centric organization, Arcserve has a presence in over 150 countries, with 19,000 channel partners and 235,000 customers.
Visit Website

SILVER SPONSORS

Commvault

Commvault

Commvault
Commvault is a worldwide leader in delivering data readiness. Commvault's backup and recovery software enables you to protect, manage, and use your data, while managing it in a consistent, compliant way.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
Dell

Dell

Dell
Dell Technologies (NYSE:DELL) helps organizations and individuals build their digital future and transform how they work, live and play. The company provides customers with the industry’s broadest and most innovative technology and services portfolio for the data era.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
Malwarebytes

Malwarebytes

Malwarebytes
Malwarebytes protects workplace productivity. We secure all your endpoints so employees can connect confidently, from anywhere. We combine analytics-driven, multi-layer threat protection and industry-leading incident response to both simplify and strengthen overall cybersecurity. You and your team stay up and running, so you can remain focused on driving your business.
Visit Website
ONE IDENTITY

ONE IDENTITY

ONE IDENTITY
One Identity portfolio of identity governance, access management, privileged management and identity as a service solutions, helps organizations optimize identity and access management (IAM).For more info, visit http://www.oneidentity.com.#GetIAMRight
Visit Website
Silver Peak

Silver Peak

Silver Peak
Silver Peak, recently acquired by HPE Aruba, delivers networking software that powers a self-driving wide area network (SD_WAN) that learns and adapts to requirements of the business to ensure the highest levels of end user and application performance.
Visit Website
Trend Micro

Trend Micro

Trend Micro
Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information.
Visit Website

BRONZE SPONSORS

Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
Carahsoft

Carahsoft

Carahsoft
Carahsoft is the trusted Government IT solutions provider and a top GSA Schedule holder, supporting a partner ecosystem of manufacturers, resellers, integrators, and consulting partners committed to serving the public sector.
Visit Website
ESET

ESET

ESET
For more than 30 years, ESET® has been developing industry-leading IT security software and services to protect businesses, critical infrastructure, and consumers worldwide.
Visit Website
ExtraHop

ExtraHop

ExtraHop
ExtraHop delivers enterprise cyber analytics that allow you to quickly investigate threats, ensure the delivery of critical applications, and secure your investment in the cloud.
Visit Website
Quest Software

Quest Software

Quest Software
At Quest, we solve complex problems with simple solutions. Our philosophy is focused on great products, great service and being simple to do business with. We deliver technology that eliminates the need to choose between efficiency and effectiveness.
Visit Website
Tools4ever

Tools4ever

Tools4ever
Tools4ever delivers affordable Identity Governance and Administration (IGA) solutions – User Provisioning, Password Management, Single Sign-On (SSO), Self‐Service, Workflow Management – connecting 10 million users to resources.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website

EXHIBITORS & ASSOCIATIONS

ARMA Sacramento

ARMA Sacramento

ARMA Sacramento
ARMA International provides education and networking opportunities to information professionals to enable them to use skills and experience to leverage the value of records and knowledge as corporate assets and as contributors to organizational success.
Visit Website
ASIS Sacramento

ASIS Sacramento

ASIS Sacramento
ASIS International is a global community of more than 38,000 security practitioners, each of whom has a role in the protection of assets - people, property, and/or information.
Visit Website
CITE

CITE

CITE
California IT in Education is a not-for-profit, association supporting the IT Professionals working in schools. Our members support hardware, software, help desk, data, WiFi, and installing and maintaining the infrastructure as technology used in schools.
Visit Website
Gigamon

Gigamon

Gigamon
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.
Visit Website
IIBA Sacramento

IIBA Sacramento

IIBA Sacramento
The International Institute of Business Analysis (IIBA) Sacramento Valley Chapter (SVC) is dedicated to bringing the Business Analyst community in Sacramento valley together to help Grow, Connect, and Evolve the Business Analysis profession.
Visit Website
InfraGard Sacramento

InfraGard Sacramento

InfraGard Sacramento
InfraGard is a cooperative undertaking between the U.S. Government (led by the FBI) and an association of businesses, academic institutions, state and local law enforcement agencies.
Visit Website
ISACA Sacramento

ISACA Sacramento

ISACA Sacramento
With more than 100,000 members in more than 180 countries, ISACA (www.isaca.org) is a recognized worldwide leader in IT governance, control, security and assurance.
Visit Website
ISSA Sacramento

ISSA Sacramento

ISSA Sacramento
ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.
Visit Website
Ivanti

Ivanti

Ivanti
Ivanti is IT evolved. By integrating and automating critical IT tasks, Ivanti is modernizing IT and helping IT organizations successfully navigate digital workplace transformation. Ivanti is headquartered in Utah, and has offices all over the world.
Visit Website
NCSi

NCSi

NCSi
MULTI LAYERED ENDPOINT SECURITY MADE EASY Prevent nearly everything. Prepare for the rest. We provide foundational security tools that create the highest barriers to real-world attacks, including: Patch Management, Application Control, Device Control and AI-enabled self-securing technology.
Visit Website
Qumulo

Qumulo

Qumulo
Qumulo, the leader in data-aware scale-out NAS, helps CIOs and storage administrators store, manage and curate enormous numbers of digital assets.
Visit Website

Interested in becoming part of our next Sacramento event?

CONTACT US FOR INFO

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.