F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Virtual Seattle 2020 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

December 10th, 2020
8:30am – 4:30pm

Virtual Conference
Multi-track seminars with Q&A
1-on-1 chat and networking
Hourly prize drawings

KEYNOTE: Seizing the Castle: A Medieval Battle Technique Workshop

  Presented by Chris Roberts • vCISO, Researcher, Hacker – HillBilly Hit Squad

Seminar Schedule

  • Theater One
  • Theater Two
  • Theater Three
  • Keynote
  • Sessions
Chris RobertsChris RobertsvCISO, Researcher, Hacker – HillBilly Hit Squad
3:00 - 3:50 PM

Seizing the Castle: A Medieval Battle Technique Workshop

  Presented by Chris Roberts • vCISO, Researcher, Hacker – HillBilly Hit Squad

The cybersecurity industry is not at a loss when it comes to cheesy castle analogies or quoting Sun Tzu whenever it gets the chance (keys to the kingdom, crown jewels, the art of war); you name it we’ve butchered it. But what if we took some time to look at the whole medieval warfare a little differently. ARE there actually lessons we CAN learn from all those who’ve gone before? Do we have something to use today that was true on the battlefield of yesteryear?

I'd argue that taking some time to study the techniques used by the Vikings, Mongols, Huns, and so on IS something we want to do. From an adversarial perspective, as well as those charged with defending the enterprise and those most prized digital assets, we CAN learn something from our hairy warmongering ancestors.

Throughout the ages we’ve spent time, effort and plenty of money defending our castles from all manner of intruders, and arguably with each passing year new tactics, weapons and techniques were (and continue to be) employed against our efforts...unfortunately, often to good effect despite our best efforts.

Join me for an unconventional workshop where we'll chat about new and emerging cyberattacks without actually talking about "cyber" at all. We'll be making parallels between the Medieval world and our own to learn something, hopefully. Or, at the very least we’ll end up working out how far we can throw a Cisco or Palo Alto firewall with a trebuchet.

Chris is currently serving as a vCISO or advisor for a number of entities and organizations around the globe. His most recent projects are focused within the deception, identity, cryptography, Artificial Intelligence, and services space. Over the years, he's founded or worked with a number of folks specializing in OSINT/SIGING/HUMINT research, intelligence gathering, cryptography, and deception technologies. These days he’s working on spreading the risk, maturity, collaboration and communication word across the industry. (Likely while coding his EEG driven digital clone that’s monitoring his tea and biscuit consumption!)

Since the late 90’s Chris has been deeply involved with security R&D, consulting, and advisory services in his quest to protect and defend businesses and individuals against various types of attack. Prior to that he jumped out of planes for a living, visiting all sorts of interesting countries and cultures while doing his best to avoid getting shot at too often. (Before that, he managed to get various computers confiscated by a number of European entities.)

He’s considered one of the world’s foremost experts on counter threat intelligence and vulnerability research within the Information Security industry. He’s also getting a name for himself in the transportation arena, basically anything with wings, wheels, tracks, tyres, fins, props or paddles has been the target for research for the last 10-15 years...to interesting effect.

As one of the well-known hackers and researchers, Chris is routinely invited to speak at industry conferences. CNN, The Washington Post, WIRED, Business Insider, USA Today, Forbes, Newsweek, BBC News, Wall Street Journal, and numerous others have covered him in the media.

And worst case, to jog the memory, Chris was the researcher who gained global attention in 2015 for demonstrating the linkage between various aviation systems, both on the ground and while in the air that allowed the exploitation of attacks against flight control system.

Topics: Information Security
9:00 - 9:50 AM

DRaaS for Everyone

  Presented by StorageCraft

Are you really ready for a data disaster? Learn more about how disaster recovery has changed the last couple years and how to put together a DR strategy for your business. Learn about a simple and economic DRaaS solution.

Topics: Data Storage
10:00 - 10:50 AM

Why Every Business Needs a Business Continuity & Disaster Recovery Strategy

  Presented by Veeam

Today’s applications and data sets are larger, more complex, distributed and interdependent than ever. While many have a disaster recovery plan in place, executing, testing and documenting these plans is often complex and cumbersome.

We'll also discuss:

  • State of BCDR today and what hinders DR planning for most companies
  • Why backup strategy is not DR strategy
  • Democratized DR of today (how tedious, manual procedures can be completely automated, and at accessible cost)
Topics: Business Continuity / Disaster Recovery
11:00 - 11:50 AM

CI/CD for Networking: Adopting DevOps Principles for a More Robust Network

  Presented by Infoblox

In recent years, continuous integration and continuous deployment, aka CI/CD, have become de facto standards for DevOps-minded software development organizations. Adoption of CI/CD enables software architects and IT specialists to create more flexible, secure and agile infrastructure with new features and functionality that are continually improved and deployed. While compute and storage aspects of environments have benefited greatly from CI/CD, network infrastructure has lagged behind.

This presentation pulls back the covers on efforts taking place to bring CI/CD philosophies to the work of revamping legacy, monolithic network architectures using cloud-native principles, microservices and containerization. The end goal is to create networks that are inherently more adaptable, scalable, automated and simpler to manage.

Speaker Bio: Glenn Sullivan is a Principal Product Manager for Emerging Technologies at Infoblox and joined the Infoblox team when SnapRoute, a company he co-founded in 2015, was acquired by Infoblox. At SnapRoute, Sullivan was responsible for product direction by advocating for the end-user. Prior to founding SnapRoute, Sullivan was responsible for building out hyperscale data center environments at Apple. In addition to core network operational functions, Sullivan led efforts to automate the lifecycle management of various platforms in a multivendor environment. Before Apple, Sullivan was a specialist support engineer on the LAN Switching team in Cisco TAC. While there, his specialty was in turning around customer sentiment by focusing on escalated issues and transforming the customer experience into a positive one. Sullivan has a BS in Network and Systems Administration from RIT (Rochester Institute of Technology).

Topics: Infrastructure, Unified Communications
1:00 - 1:50 PM

Zero-Trust Network Access

  Presented by Fortinet

Controlling users and devices on today’s networks is challenging. Many types of users requiring different levels of access need an automated solution. Devices are sneaking onto networks without approval and require visibility and control. Learn how Zero-Trust Network Access solution addresses the issue of knowing who, what, where and when and controlling everyone and everything on and off the network.

Topics: Infrastructure
2:00 - 2:50 PM

Adding Anomaly Detection to Your Secure Access Strategy

  Presented by Cisco

Security analytics are a double-edged sword: while the information they provide can be vital to identify potential issues or anomalies before they become problems, the quantity of data collected, and alerts generated can overwhelm even the most experienced security team. As an admin, you want to efficiently focus on the likely risks and remediate them. How can we best filter the noise of routine authentications and highlight anomalous logins that may require attention? Join Cisco's Ted Kietzman to explore anomaly detection and secure access.

Topics: Information Security
  • Sessions
9:00 - 9:50 AM

SD-WAN Edge Transformation for the Cloud-First Enterprise

  Presented by Silver Peak & Structured

As cloud adoption and SD-WAN innovation hastens, global enterprises are transforming how they build and secure wide area networks. Leveraging automation, enterprises can deploy, connect and secure hundreds of sites per week, a feat not possible with a traditional device-centric approach.

During this session, we'll discuss how the unification of SD-WAN, WAN optimization, routing and security in a single, centrally orchestrated platform:

  • Delivers superior application performance wherever apps are hosted
  • Increases the quality of experience for end users and for IT
  • Simplifies branch WAN edge architecture
Topics: Data Storage, Infrastructure
10:00 - 10:50 AM

Master the Edge: How to Achieve Context-Aware, Zero Trust Network Access

  Presented by Aruba & Structured

Have you been tasked with implementing Zero Trust Network Access but are unsure of how to go about it? Are you confused about how to achieve “minimum access”? Are you struggling with employing “continuous adaptive risk & trust assessment” on your network? If so, attend this session. Learn how to deploy an open, multi-vendor Enterprise security framework that gives security and IT teams an integrated way to gain visibility, control, and advanced threat defense. See how security prioritization and machine learning helps organizations leverage existing third-party solutions to better protect investments and implement proactive risk controls.

Topics: Information Security
11:00 - 11:50 AM

Hacking Exposed: A Look Inside the Techniques of OceanLotus/APT32

  Presented by Cylance & Structured

Cyberattacks are among one of the most prevalent threats to organizations and individuals today. Understanding how cybercriminals operate is essential in defending leading organizations and governments against them. In a session facilitated by BlackBerry’s Chief Evangelist, Brian Robison, attendees will learn first-hand, the tools and techniques of real-world threat actors. This goal of this session is to understand some of the thought processes and techniques used by adversaries and to help CIOs guide their organization’s resources to defend against cybersecurity threats.

Topics: Information Security
12:00 - 12:50 PM

Software Implementation, Governance and Emotional Intelligence (EQ)

  Presented by Puget Sound PMI

Join President of the Pacific Northwest Organization Development Network (www.PNODN.org), Chris Crosby, as he shares the governance strategy that he created as the Change Management lead on a global ERP implementation.

Mr. Crosby developed and executed the change strategy for the largest software implementation (Oracle) in the history of Alcoa CSI spanning 18 locations throughout USA, Mexico, Costa Rica, Spain, Hungary, and Germany. Each location reached stability in one month, five months faster than any previous Alcoa Business Unit. Chris’s plan was recognized as the benchmark change plan in Alcoa by the Project Management Office. He then repeated his success in 2010 in Guadalajara, Mexico, 2011-2012 in Asia-Pacific (China, Korea, HK, and the Philippines), and 2013 in South America (Peru and Columbia).

What does EQ have to do with it? Chris will weave throughout the conversation various core Organization Development principles and talk about their relationship with Emotional Intelligence.

Presenter:
Chris Crosby • President of the Board, Pacific Northwest Organization Development Network

Topics: Infrastructure
1:00 - 1:50 PM

Putting AI to Work to Help Fight Cyberattacks

  Presented by Palo Alto

Hackers are increasingly automating their attacks, enabling them to exploit vulnerabilities more quickly. Cybersecurity software vendors are responding by turning to machine learning technology, a subset of artificial intelligence (AI), to try to stay one step ahead of the bad guys. This presentation will talk about how machine learning is used to help identify variations of known threats and patterns in attacks in order to predict the next stages of an attack, then automatically create and implement protections for customers in near real-time.

Topics: Artificial Intelligence, Information Security
2:00 - 2:50 PM

Shifting from ITSM to ESM as a Way to Enable and Transform the Enterprise

  Presented by ServiceNow

As a member of IT, have you found yourself doubting your relationship with the rest of the organization as you're perceived as a cost center rather an equal part stakeholder with a common goal? Do you find yourself struggling to collaborate with the rest of the organization as the tech debt in your organization has created seemingly insurmountable silo's? If you feel any of this describes your work environment and how IT may be perceived, please join the discussion in how the concepts of IT Service Management need to shift to a more inclusive Enterprise Service Management strategy. Ultimately, driving more effective technology purchasing, collaboration across the enterprise and re-branding of IT as an organizational enabler.

Topics: Culture
  • Sessions
9:00 - 9:50 AM

Automating the Analyst

  Presented by Darktrace

Alongside the rise of today’s dynamic workforce, the speed and scale of sophisticated cyber-attacks is rapidly increasing. As the cybersecurity industry continues to endure an ongoing skills shortage, over-worked and under-resourced teams urgently need augmentation in order to defend against evolving, sophisticated threats.

For over three years, Darktrace experts have been working to meet this challenge, investigating whether they could teach AI to think like a cybersecurity analyst. It takes subtle, nuanced skills and implicit knowledge for an analyst to detect genuinely threatening activity, and the creation of the world-first Cyber AI Analyst took analyzing over one hundred of the world’s top threat analysts and complex machine learning algorithms.

Topics: Information Security
10:00 - 10:50 AM

Zero Trust and the Flaming Sword of Justice

  Presented by Cisco

Security breaches pervade the headlines. What was seen as a rare instance just 5 years ago now seems to occupy the daily news cycle. A lot of these data breaches are made possible due to missteps and misconfigurations. There are many security issues introduced into website authentication mechanisms that further compound the security issues in addition to enforcing bad behavior by the end users. Security debt is a real problem for the vast majority of organizations in the world today and the attackers will utilize this to their advantage. In addition to keeping system hygiene at the front of the mind, defenders need to focus on proper network zone segmentation or, as it is a more popular term these days, zero-trust networks. The old conceptual style of a castle wall and moat to defend a network was deprecated several years ago. As a result of the dissolution of the traditional perimeter, a stronger focus has to be placed on the strength of authentication, authorization, and trust models for the users.

The antiquated notion of an information security practitioner running through the office brandishing their flaming sword of justice above their heads screaming “thou shall not pass” has at long last reached the denouement. Whether you are responsible for the security in a financial organization or one that makes teddy bears it is necessary to adapt and learn to trust, but verify."

Topics: Information Security
11:00 - 11:50 AM

Architecting for the Agentless

  Presented by Gigamon

Today's networks are swarming with IoT, OT, and virtual devices of every size and shape. As they have proliferated, and the security attack surface has likewise increased, the market has responded with a wide variety of technologies to help understand, manage, and secure just what is on your network. This is the rise of the technologies classified as "agentless" and there is a good chance you will be looking, now or in the future, at a project that comprises such technologies. While much of what is fundamentally required to enable these technologies is not new, organizations struggle with trying to implement these on an "ad hoc" basis, with little thought to future considerations or scale. This presentation will take about a more strategic approach to handling these implementations, what a visibility fabric is, and how today's organizations can architect their environments for their future needs.

Topics: Information Security, Infrastructure
12:00 - 12:50 PM

State of the Industry: Strategic Trends in Cyber Security

  Presented by Check Point Software

Join Check Point for a discussion on 2020-2021 Cyber Trends including:

  • Adversarial attack realities and performances
  • Prevention & Defense Strategies and realities
  • Threat intelligence summary
Topics: Information Security
1:00 - 1:50 PM

Enduring from Home: COVID-19’s Impact on Business Security

  Presented by Malwarebytes

All of us are living in the new Work from Home normal caused by the rapid transmission and spread of COVID-19. While people everywhere have been worried about stopping the spread of COVID, malicious threats have not only continued to propagate but they have exploded in new and interesting ways. During this presentation we will review some of the more creative ways hackers have targeted business and individuals during the age of Work from Home and some ways to protect yourself from them.

Topics: Information Security
2:00 - 2:50 PM

DRaaS for Everyone

  Presented by StorageCraft

All of us are living in the new Work from Home normal caused by the rapid transmission and spread of COVID-19. While people everywhere have been worried about stopping the spread of COVID, malicious threats have not only continued to propagate but they have exploded in new and interesting ways. During this presentation we will review some of the more creative ways hackers have targeted business and individuals during the age of Work from Home and some ways to protect yourself from them.

Topics: Data Storage

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Scott Benson
Systems Manager
Mud Bay

Shannon Boldt
Manager, Information Systems
Point No Point Treaty Council

Tim Crawford
Interim Chief Technology Officer
Federal Way Public Schools

Alex Di Giacomo
ST Information Security & ORCA CISO
Sound Transit

John Forrister
Director, Networking and Information Security
Tgen

Ian Gorrie
Chapter President
OWASP

Ren Guardiano
Director, IT Business Services
Seattle Children’s Hospital

Brian Hanson
Sr Director, Technology
Comcast

Dean Haverstraw
Director, Information Technology
Samson Inc.

Bob Johnson
Director, Information Services
Turner Construction Group

Lawerence Kane
Sr Leader, IT Infrastructure
Boeing Company

Randall Kintner
Chief Information Officer
LifeSpan BioSciences, Inc.

John McRoberts
Sr Technical Director
AT&T

Lupe Mejia
Technology Administrator
Yakima County

Brian Moore
Director, Information Technology
Tacoma-Pierce County Health Department

Ward Naf
Director, Information Technology
Whatcom Community College

Tony North
President
HDI

Tim Pugil
Vice President, IT Operations
Harborstone Credit Union

Jim Rawley
Network System Operations Lead
City of Bellevue

Ashley Riggs
Manager, IT Operations
City of Auburn, Wa

Lionel Roberts
Manager, Information Technology
Emerald Services

Randall Rusher
Manager, Information Technology
Meteorcomm

Lisa Sandoval
Director, IT Programs
Seattle Central College

Michael Secright
Chief Information Officer
HFS University of Washington

Skylar Shaw
Director, Information Technology
Zetec

Shawn Shultz
Director, Technology
Prosser School District #116

Harald Upegui
Information Security Officer
HealthPoint

Alyssa Wilson
Manager, Information Technology
Fungi Perfecti, LLC

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Cisco

Cisco

Cisco
Cisco is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. Cisco delivers intelligent cybersecurity for the real world.
Visit Website
StorageCraft

StorageCraft

StorageCraft
Arcserve is a global top 5 data protection vendor with best-in-class solutions that manage, protect, and recover all data workloads, from SMB to enterprise and regardless of location or complexity. A 100% channel-centric organization, Arcserve has a presence in over 150 countries, with 19,000 channel partners and 235,000 customers.
Visit Website
Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface & the power to take on the ever-increasing performance requirements of the borderless network – today and into the future.
Visit Website
Gigamon

Gigamon

Gigamon
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.
Visit Website
Infoblox

Infoblox

Infoblox
Infoblox unites networking and security to deliver unmatched performance and protection. Trusted by Fortune 100 companies and emerging innovators, we provide real-time visibility and control over who and what connects to your network, so your organization runs faster and stops threats earlier.
Visit Website
Malwarebytes

Malwarebytes

Malwarebytes
Malwarebytes protects workplace productivity. We secure all your endpoints so employees can connect confidently, from anywhere. We combine analytics-driven, multi-layer threat protection and industry-leading incident response to both simplify and strengthen overall cybersecurity. You and your team stay up and running, so you can remain focused on driving your business.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website
ServiceNow

ServiceNow

ServiceNow
ServiceNow is changing the way people work. ServiceNow provides service management for every department in the enterprise including IT, human resources, facilities, field service and more.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website

BRONZE SPONSORS

3R Technology

3R Technology

3R Technology
Providing complete ITAD services since 2003, including state-of-the-art secure data destruction, refurbishment, and e-commerce solutions. Our R2:2013 and NAID AAA certifications guarantee environmental safety and sustainability, while ensuring your data and assets are managed responsibly.
Visit Website
Dasher Technologies

Dasher Technologies

Dasher Technologies
Dasher Technologies is a leading national IT solution provider, headquartered in the Silicon Valley that designs, delivers, and manages innovative solutions that digitally transform businesses.
Visit Website
NinjaRMM

NinjaRMM

NinjaRMM
NinjaRMM is a leading, cloud-based remote monitoring and management platform that combines powerful time-saving functionality with an intuitive easy-to-use UI that MSPs and IT pros actually love to use.
Visit Website
Quest Software

Quest Software

Quest Software
At Quest, we solve complex problems with simple solutions. Our philosophy is focused on great products, great service and being simple to do business with. We deliver technology that eliminates the need to choose between efficiency and effectiveness.
Visit Website
RakworX

RakworX

RakworX
RakworX manufactures high-quality data center infrastructure products which provide security, power distribution, and airflow management wherever data is created, processed, transmitted and stored.
Visit Website
Securonix

Securonix

Securonix
Securonix is SIEM as a service. It reduces noise, prioritizes alerts, and responds to insider and cyber threats.
Visit Website
Tools4ever

Tools4ever

Tools4ever
Tools4ever delivers affordable Identity Governance and Administration (IGA) solutions – User Provisioning, Password Management, Single Sign-On (SSO), Self‐Service, Workflow Management – connecting 10 million users to resources.
Visit Website

EXHIBITORS & ASSOCIATIONS

A-Rack

A-Rack

A-Rack
A-Rack Information Technology Co., and RakworX Inc. provide high end and Uptime TIER Ready certified solutions for traditional, modular and "edge" data center design and architecture worldwide.
Visit Website
Cylance

Cylance

Cylance
BlackBerry Cylance develops artificial intelligence to deliver prevention-first, predictive security products and smart, simple, secure solutions that change how organizations approach endpoint security.
Visit Website
HDI Seattle

HDI Seattle

HDI Seattle
HDI is the world’s largest IT service & technical support membership association and the industry’s premier certification and training body. Guided by an international panel of industry experts and practitioners.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
InfraGard Washington

InfraGard Washington

InfraGard Washington
InfraGard is a partnership between the FBI and the private sector representing businesses, academia, state , local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the U.S.
Visit Website
ISSA Puget Sound

ISSA Puget Sound

ISSA Puget Sound
The Information Systems Security Association (ISSA) is a not-for profit international organization of information security professionals and practitioners.
Visit Website
Matrix Networks

Matrix Networks

Matrix Networks
Helping businesses both big and small accomplish their IT and communication goals by delivering innovative technologies supported by integrity, reliability, and genuine customer care.
Visit Website
OWASP Seattle

OWASP Seattle

OWASP Seattle
OWASP is an open community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted. All of the OWASP tools, documents, forums, and chapters are free and open to anyone interested in improving application security. We advocate approaching application security as a people, process, and technology problem because the most effective approaches to application security include improvements in all of these areas.
Visit Website
Puget Sound PMI

Puget Sound PMI

Puget Sound PMI
The Puget Sound Chapter of the Project Management Institute is part of an international nonprofit professional organization dedicated to advancing project management excellence through professionalism.
Visit Website
Silver Peak

Silver Peak

Silver Peak
Silver Peak, recently acquired by HPE Aruba, delivers networking software that powers a self-driving wide area network (SD_WAN) that learns and adapts to requirements of the business to ensure the highest levels of end user and application performance.
Visit Website

Interested in becoming part of our next Seattle event?

CONTACT US FOR INFO

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.