F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Virtual Seattle 2021 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

December 9th, 2021
8:30am – 4:30pm

Virtual Conference
Multi-track seminars with Q&A
1-on-1 chat and networking
Hourly prize drawings

KEYNOTE: [1 CPE] Lessons to Share: An Expert’s Guide to Ransomware Remediation

  Presented by Brian Miller • Co-Founder and CEO, FusionTek

Seminar Schedule

  • Theater One
  • Theater Two
  • Theater Three
  • Theater Four
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Zero-Trust Architectures

  Presented by Rubrik

Organizations have invested heavily in IT security, attempting to fortify their perimeter, network, endpoint, and application protections. Despite these investments, hackers are successfully penetrating these defenses and targeting enterprise data, including backup data. Ransomware is starting to specifically target online backups by encrypting or deleting them. If your organization was the target of an attack today, how do you know what data was impacted and where? Manually sifting through millions of files and comparing each snapshot consumes FTE time and prolongs recovery exponentially. Mass restores of the entire environment could mean high data loss and weeks' worth of work down the drain. In this session, we will discuss how to protect your last line of defense, the backups. We will walk through the anatomy of a recovery, the best practices, and advanced tools to ensure you will not have to pay a ransom, and how to quickly recover your data to continue business operations.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Shifting Cloud Architecture Left – Best Practices for Securing Cloud Deployments

  Presented by Trend Micro

As Infrastructure as Code becomes the norm for new cloud deployments, how can you accelerate your teams in building better? The AWS Well-Architected Framework is a great place to start for your planning but what if there was a way to continuously monitor how your deployment stacks up?

In this session, you’ll hear from Jason Dablow, a senior cloud security advisor with Trend Micro, on resources and tips to not only increase the security of your cloud deployments but also easy integration tips to move this implementation left into your teams using infrastructure as code. Automated. Integrated. Flexible.

Topics: Information Security, Infrastructure
11:00 - 11:50 AM

[1 CPE] How to Stay Ahead of the Curve in the Ransomware Crisis

  Presented by Blumira

Unfortunately, ransomware is here to stay. Ransomware attacks are becoming more profitable, and ransomware-as-a-service operations continue to lower the barriers of entry for more cybercriminals to launch attacks.

Major attacks like Colonial Pipeline have put ransomware in the spotlight, but it’s not enough to simply be aware of ransomware. Security and IT professionals need to take action and be ahead of the curve to prevent ransomware.

Matt Warner, CTO and co-founder of Blumira, a threat detection and response provider, will discuss what security teams should arm themselves with to win the battle against ransomware. He’ll cover:

  • An overview of the current ransomware threat landscape
  • Security tools and methods to have in your arsenal to detect signs of ransomware
  • Suspicious activity to look for in each step of the ransomware kill chain
  • How leaning into IT security fundamentals can prevent ransomware outbreaks

Matt has over 10 years of experience in IT and development, focusing on business strategy, development, compliance, threat detection, and penetration testing. Previously, he was Director of Security Services, Development & Security at NetWorks Group, responsible for defensive information security and services.

Topics: Information Security
12:00 - 12:50 PM

[1 CPE] Digital Pandemic: Risk Management & Ransomware

  Presented by INTERFACE Advisory Council

In the summer of 2020, as the world isolated from a pandemic, threat actors began targeting schools, hospitals, and critical public agencies with ransomware. In April of 2020, as the world transitioned overnight to telework, our agency became one of their early targets. In this case study, audiences will trace the attack and response, gain an understanding of the impact of a ransomware attack, learn about the recovery process, and explore commonalities that will allow them to apply our “lessons learned” to their own operations.

Speakers:
Clairmonte Cappelle • Executive Director, Puget Sound Educational Service District
Diana Brown • Director of Agency Technology, Puget Sound Educational Service District

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Immutable Storage: Level-Up Ransomware Readiness

  Presented by Arcserve & StorageCraft

IDC advises that a 3-2-1-1 strategy is the new best practice for effectively protecting customers against ransomware. The last 1 is the important piece of the puzzle, where a copy is also stored on immutable storage. The growing risk of compromise to your customers’ data – specifically via ransomware DEMANDS the most up to date and complete solutions arsenal.

Topics: Data Storage, Information Security
2:00 - 2:50 PM

[1 CPE] Intelligence as a Service: Building Intelligent Apps with Azure Cognitive Services

  Presented by Atmosera & Wintellect

Need to write an app that uses facial recognition to identify people entering a building? An app that raises an alert if tweets referencing your organization turn negative? Or an app that uses AI to flag potentially fraudulent invoices or digitize millions of documents? AI enables all of these scenarios and more, but the models used to make it happen are too sophisticated for the average software developer to build on their own. Azure Cognitive Services provides the intelligence needed to do all this and more without requiring expertise in data science, machine learning, and neural networks. Learn how to use Azure Cognitive Services to build apps that leverage the latest advances in AI, and go home with sample code that you can use as a starting point for apps of your own.

Topics: Digital Experience, Infrastructure
Brian MillerBrian MillerCo-Founder and CEO, FusionTek
3:00 - 3:50 PM

[1 CPE] Lessons to Share: An Expert’s Guide to Ransomware Remediation

  Presented by Brian Miller • Co-Founder and CEO, FusionTek

If ransomware makes it past your front line of defense, what's your next move?

Many businesses get caught in situations where they believe the classic line "this will never happen to me." That may be true until it does happen to them. From there, a series of unfortunate events will unroll, leaving the business vulnerable to large ransoms which they may or may not be able to pay. Don't be this business.

This past year, our incident response team has worked on several ransomware remediation projects, and through this effort learned more about how ransomware is deployed. During this presentation, we are going to walk you through how ransomware has changed over time, help you understand what a hacker looks for nowadays, and actionable protection steps to take.

In this presentation you will learn about:

  • The evolution of ransomware
  • Common characteristics of infection
  • A hacker’s typical timetable
  • Recommended actions for remediation

Brian Miller is the co-founder and CEO of FusionTek. He has over 20 years of IT service experience and co-founded FusionTek in 2007. He is focused on delivering advanced cybersecurity and productivity solutions to FusionTek’s clients.

Topics: Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] Ransomware In Focus: How AI Surgically Contains the Threat

  Presented by Darktrace

In the immediate aftermath of a ransomware attack, executives too often face a difficult dilemma: either pay a ransom or shut down critical systems and services. In today’s increasingly complex digital ecosystems, the collateral damage that ensues from ransomware attacks can be broad-ranging and destructive, with organizations taking days, weeks, or even months to recover.

But what if there was another way out – a way to surgically contain ransomware in its earliest stages, without disrupting normal business operations? Join this presentation to learn how Cyber AI is helping thousands of organizations fight back against ransomware. We’ll discuss:

  • The impact of ‘double-extortion’ ransomware and ‘ransomware-as-a-service’
  • Real-world examples of ransomware detected by Cyber AI
  • How self-learning AI responds proportionately to ransomware, thanks to its deep understanding of an organization’s pattern of life
Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Security at the Edge of Hybrid Work

  Presented by Citrix Systems

Robust and secured internet connectivity is essential to delivering on the promises of hybrid work. From defining the scope of experience across the workforce to protecting privileged and administrative access, evolved technologies and protective measures are required from the browser to the cloud. This session will help you understand how security at the edge combined with robust application access management and secured browser solutions enable the security outcomes essential to hybrid work.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Real-Time Defender Velocity: Code on Code Warfare

  Presented by SentinelOne

Organizations spend more money on cyber security tools every year, yet the number of breaches and the cost of these breaches continues to increase. A new approach is needed that relies on autonomous analysis that can respond at machine speed. By embracing automation, AI, and big data analytics, organizations can better prevent threats, find, and detect what is missed, provide contextual linking for forensic and threat hunting ¬– and even more importantly – self-heal and fully recover when necessary.

Topics: Information Security
12:00 - 12:50 PM

[1 CPE] Cybersecurity Maturity Model Certification: Considerations for Compliance

  Presented by MTA Solutions

Everything You Need to Know About CMMC:

In 2007, Chinese hackers successfully targeted a Department of Defense (DoD) subcontractor leading to the creation of a powerful fighter jet. During this cyberattack, the Chinese stole enough data to make their J-20 stealth fighter jet a real threat to the USA. The reality of this attack is that it wasn’t just a one-off event—over $600 billion is lost globally due to cyber theft every year. With that in mind, the DoD knew something needed to change.

Changes to cybersecurity compliance are coming. Before the introduction of the cybersecurity maturity model certification (CMMC), any self-attesting defense contractors could say that they were compliant with specific cybersecurity guidelines—without having to prove it. This not only left room for contractors to become complacent but diminished all compliant defense contractors’ credibility. In short, contractors who were reckless with sensitive information weren’t held accountable—until now.

With the rollout of the CMMC, contracting with the DoD is more specialized than ever—especially if you’re dealing with controlled unclassified information (CUI). But these new guidelines also mean the space will become more lucrative. It’s estimated that 129,810 businesses will likely pursue CMMC certification in the first 5 years.

CMMC boils down to 3 major points:

  1. It’s mandatory. All CMMC requirements will explicitly address what level your company needs to be at to send or receive any future federal agency RFIs and RFPs.
  2. It’s verifiable. Proof of certification will be accessible electronically.
  3. It’s a long-term investment. Many organizations see between 12-18 months of continual effort to complete their compliance projects fully.

Presented by Rob Thurston, Chief Technology Officer at Ampersand, Alaska’s leading technology services provider, attendees will learn about compliance requirements, sustainability, and risks for DoD contractors.

Topics: Business Continuity / Disaster Recovery, Strategic Management
1:00 - 1:50 PM

[1 CPE] Drive Digital Transformation with Offices of the CIO and CISO Collaboration

  Presented by Secureworks

The last 18 months have seen IT organizations rapidly move workloads to the cloud, support hybrid work, and drive end user adoption of new business applications. But without a robust security structure integrated into these new architectures, companies leave themselves at risk.

In this session, learn first-hand from the partnership between the Offices of the CIO and CISO at Secureworks on how to:

  • Align IT initiatives to security transformation programs
  • Reduce the complexity of implementing new digital initiatives by aligning security models early
  • Protect their organization’s critical data through early threat detection and response
Topics: Information Security, Infrastructure
2:00 - 2:50 PM

[1 CPE] The Anatomy of a Ransomware Attack

  Presented by Red Canary

In this presentation, we walk through the Anatomy of a Ransomware Attack. Bobby Mazzotti will lead the discussion on best practices and strategies you can apply at your organization. In this webinar, security leaders will learn:

  • How to enhance your team’s abilities to identify security incidents
  • The key components of a ransomware attack
  • Effective ways to improve your security program
Topics: Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] Securing the Hybrid Cloud: Visibility Best Practices

  Presented by Gigamon

With the move to cloud and the multitude of approaches, your ability to effectively monitor and secure workloads gets even more difficult. IT complexity, the rate of change, lack of skills, and organizational silos have made confidently managing security and performance nearly impossible. Visibility is critical. Join us for a discussion of the security considerations for on-prem private, public, and hybrid clouds. You’ll learn best practices and see how a little planning and design can go a long way. Achieve a secure and viable hybrid cloud implementation and get a high return on your investment.

Topics: Data Storage, Infrastructure
10:00 - 10:50 AM

[1 CPE] Ransomware Resilience: Best Practices to Prepare, Mitigate, and Recover

  Presented by Zerto

Large organizations are still being forced to pay ransoms due to ransomware attacks. Disruptions to services and supply chains are putting ransomware victims in the news under a negative spotlight. Join recovery and resilience experts from Zerto to discuss best practices to minimize downtime and avoid paying ransoms by being prepared. In this session, you’ll learn:

  • Ransomware 101: A breakdown of a ransomware attack and how it affects systems
  • What steps you can take to reduce the likelihood of attacks on your system
  • How to best choose a recovery solution for ransomware
  • How you can best harden your recovery systems against attacks
  • How to create a recovery plan to react and recovery quickly
  • How a company hit twice by ransomware improved recovery time from weeks to minutes by planning ahead
Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Situational Awareness Into the Dark Web

  Presented by Check Point Software

In our journey through this session, we take you through the evolution, goals, and motivation of the Dark Web. We will share with you what and whom you can find on the platforms as well as the major conflicts individuals face while exploring this web. The session also exposes you to the syndicates and structures running on the platforms. Surprisingly, we see how those groups were among the first to embrace and implement Blockchain technology and created a major global demand for crypto currencies. This is the time to listen, learn, and be exposed to the deepest secrets of the Dark Web.

Topics: Information Security
12:00 - 12:50 PM

[1 CPE] Metrics That Matter: Confidence and Resilience in Your Security Program

  Presented by ReliaQuest

CISOs say that what they need most in their security program is the confidence that people, processes, and technology are working and effective, and that controls are in place to ensure resiliency in the case of a major event. “Risk” is the vocabulary of the business, yet measuring and discussing this all-important concept in an actionable way remains a unique challenge. In this session, we will discuss:

  • Actionable risk metrics, both for use inside the security function and with outside stakeholders
  • How the language and awareness of information security risk has evolved
  • How the right metrics will benefit the business and win investment for security
Topics: Information Security, Infrastructure
1:00 - 1:50 PM

[1 CPE] Endpoint Systems Management: Time to Rethink

  Presented by Quest Software

See the recent changes to the endpoint environment and how these affect your infrastructure. Learn how these changes affect your network design and what this means for your daily business. Learn more about the new technologies available for managing your endpoints and see some tips and guidelines to be prepared for what’s next.

Topics: Infrastructure, Strategic Management
2:00 - 2:50 PM

[1 CPE] Cybersecurity Market Trends and MDR

  Presented by Bitdefender

Mobile workforces were already an increasing trend in business even before we all had to deal with sending our teams home during the pandemic. As many of us work through our return to office plans with hope in our hearts, it is clear that the remote work trend has intensified and will likely continue to do so in the future.

Remote work has challenged traditional security approaches and forced us to think harder about how we can best support the changing nature of work. Thankfully, many of the technology, process, and people changes needed to support remote workers have significant benefits in our overall security posture.

For this session, we’ll talk about trends our security operations center saw in remote work environments and their impact on security operations, discuss theories around how to plan and support these workers, and talk about technology approaches that may help your organization support these workers better while improving your overall security posture.

Topics: Information Security, Strategic Management
  • Sessions
9:00 - 9:50 AM

[1 CPE] Thinking Upstream About White House Cybersecurity Executive Order 14028

  Presented by Tidelift

A few months ago, the U.S. White House released cybersecurity executive order 14028, an attempt by the United States government to use its purchasing power to create positive changes to the way cybersecurity is addressed around the world.

Recent high-profile breaches like the Colonial Pipeline ransomware attack or the SolarWinds software supply chain attack have shown that our cybersecurity defenses are woefully inadequate. This executive order forces a higher standard of cybersecurity for any organization selling software to the federal government, which in turn makes it the de facto global standard for all software in the future.

Tidelift CEO and co-founder Donald Fischer shares his perspective on how the cybersecurity executive order impacts software supply chain security. He’ll brief attendees on the key issues addressed by the executive order, including software bill of materials (SBOM), supply chain security, and provenance requirements. He’ll outline the gaps that most organizations will need to close to stay in compliance. And he’ll share a proactive approach to addressing open-source software supply chain health and security upstream.

If you want to ensure your organization is fully prepared for the coming changes, you won’t want to miss this session.

Topics: Information Security, Infrastructure
10:00 - 10:50 AM

[1 CPE] Zero Trust: From Theory to Reality in Five Steps

  Presented by Guardicore

Let’s be real. True to its name, there is zero trust about the term “zero trust.” It’s been used as marketecture since its inception. Cut through the fog with this presentation with practical insight and steps to take to ensure your organization makes the most out of ZTA.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Security vs. Compliance: Turning InfoSec Success into Audit Wins

  Presented by Tripwire

Security and compliance teams both strive to design, establish, and enforce controls to protect an organization. But even with shared goals in place, security and compliance teams often manage business risk in relative isolation. So how can these teams set aside tension and work better together to create a winning alliance?

In this session, we explore the key differences between security and compliance initiatives. It’s crucial to understand that being fully compliant doesn’t necessarily mean an organization is fundamentally secure. We’ll cover how the two initiatives complement each other when it comes to minimizing risk and how both teams can collaborate to create efficiencies. Attendees will learn how to leverage compliance policies to set the foundation to a robust information security program, while providing true visibility and coverage, consolidating toolsets, and reducing costs. Lastly, we’ll discuss how to ensure that a successful security program can help organizations prepare for an upcoming audit to ultimately achieve and maintain continuous compliance.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Automated Enforcement Advances: Protecting Against Ransomware

  Presented by Illumio

Attackers are continuing to successfully set off cyber disasters across the globe. Organizations that focus solely on detection and response find that they can’t detect or respond fast enough. Cyberattacks and ransomware break through perimeters and then leverage common ports to stay undetected until they have spread throughout an organization.

There are new advancements that allow organizations to protect their key assets from cyberattacks and ransomware in minutes - across multi cloud, containers, hybrid and on-premises environments.

We'll discuss how these innovations can help you:

  • Immediately enforce security policy across your organization to protect high-value assets.
  • Dramatically reduce the risk of supply-chain attacks like the recent Kaseya ransomware.
  • Scale as needed to enforce more than 100,000 workloads in cloud, hybrid, and on-premises environments.
  • Get real-time visibility and insights to create, enforce, and test security policy.
  • Monitor workloads in and out of applications hosted in public clouds to simplify and secure cloud migrations and automate multi-cloud security.
Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Health and Safety Innovations Lay a Smart Digital Foundation

  Presented by Hitachi Vantara & IT1 Source

The pandemic has accelerated innovation to protect health and safety, while laying a foundation for broader digital transformation across industries. Learn how automated detection of PPE, social distancing, collision avoidance, thermal scanning, and compliance analytics are helping companies reduce risk while protecting their workers and customers, and how this shift is preparing them to thrive in our digital future.

Topics: Infrastructure, Strategic Management

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Jeff Baine
Manager, IS and Telecommunications
Lewis County Public Utility District

Scott Benson
Manager, Systems
Mud Bay

Bruce Bock
Manager, IT Services
Pacific Woodtech Corp

Shannon Boldt
Manager, Information Systems
Point No Point Treaty Council

Jeff Brausieck
Manager, Cyber Security
Seattle City Light

Diana Brown
Director, Agency Technology
Puget Sound Educational Service District

Shawn Cook
Director, Technology
Prosser School District #116

Tim Crawford
Interim Chief Technology Officer
Federal Way Public Schools

Stephen Doherty
Manager, Information Technology
The Tulalip Tribes

John Forrister
Director, Networking and Information Security
TGen

Ren Guardiano
Director, IT Business Services
Seattle Children’s Hospital

Dean Haverstraw
Director, Information Technology
Samson Inc

Don Hendrix
Sr Manager, Technology Security
AT&T

Julia Jackson
Director, Technology & Privacy Audit
T-Mobile

Bob Johnson
Director, Information Services
Turner Construction Group

Lawerence Kane
Sr Leader, IT Infrastructure
Boeing Company

Daniel Lungu
Sr Manager, Network Infrastructure
Regal Logistics

Steven McAdams
Sr Manager, IT Security
Partner Therapeutics

Lupe Mejia
Technology Administrator
Yakima County

Michael Middlebrooks
Director, Information Technology
UW School of Medicine

Robb Montejano
Director, Information Technology
Era Living

Brian Moore
Director, Information Technology
Tacoma-Pierce County Health Dept

Ward Naf
Director, Information Technology
Whatcom Community College

Greg Olschwang
Director, Information Technology
Ryan, Swanson & Cleveland PLLC

Tim Pugil
Vice President, IT Operations
Harborstone Credit Union

Jim Rawley
Network System Operations Lead
WA City of Bellevue

Ashley Riggs
Manager, IT Operations
WA City of Auburn

Lionel Roberts
Manager, Information Technology
Emerald Services

Michael Secright
Chief Information Officer
HFS University of Washington

Skylar Shaw
Director, Information Technology
Zetec

Harald Upegui
Information Security Officer
HealthPoint

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Atmosera

Atmosera

Atmosera
Atmosera is a leading provider of business-class cloud solutions, providing Azure-managed cloud services for public, hybrid, and private clouds.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website

SILVER SPONSORS

Arcserve

Arcserve

Arcserve
Arcserve is a global top 5 data protection vendor with best-in-class solutions that manage, protect, and recover all data workloads, from SMB to enterprise and regardless of location or complexity. A 100% channel-centric organization, Arcserve has a presence in over 150 countries, with 19,000 channel partners and 235,000 customers.
Visit Website
Bitdefender

Bitdefender

Bitdefender
Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide. Guardian over millions of consumer, business, and government environments, we are the industry’s trusted expert for eliminating threats, protecting privacy and data, and enabling cyber resiliency.
Visit Website
Blumira

Blumira

Blumira
Blumira’s detection and response platform helps organizations of all sizes quickly stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Blumira’s free edition allows you to gain visibility into your Microsoft 365 environment within minutes. No credit card or sales conversation required. Get started for free today at blumira.com/free.
Visit Website
Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
Citrix

Citrix

Citrix
Citrix Systems is the global leader and the most trusted name in application delivery infrastructure. More than 200,000 organizations worldwide rely on Citrix to deliver applications with the best performance, highest security and lowest cost.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
FusionTek

FusionTek

FusionTek
FusionTek is a managed service provider specializing in providing reliable IT services design for our clients demanding IT needs. In addition to managed services, we specialize insecurity and unified communication projects.
Visit Website
Gigamon

Gigamon

Gigamon
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.
Visit Website
Guardicore

Guardicore

Guardicore
Guardicore, now part of Akamai, delivers easy-to-use Zero Trust network segmentation to security practitioners across the globe. Our mission is to minimize the effects of high-impact breaches, like ransomware, while protecting the critical assets at the heart of your network. We shut down adversarial lateral movement, fast. From bare metal to virtual machines and containers, Guardicore has you covered across your endpoints, data centers and the cloud. Our software-based platform helps you become more secure to enable your organization’s digital transformation.
Visit Website
Hitachi Vantara

Hitachi Vantara

Hitachi Vantara
Hitachi Vantara helps enterprises create and derive value from their data. Its solutions include best-in-class data management, IT infrastructure and analytics products, IoT solutions and Smart Spaces technologies for a broad range of industries.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
Illumio

Illumio

Illumio
Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes how workloads and devices are communicating, creates granular segmentation policies which only allow necessary communication, and automatically isolates ransomware and breaches. Assume breach. Minimize impact. Increase resilience.
Visit Website
iT1 Source

iT1 Source

iT1 Source
Since 2003, iT1 Source has provided a wide range of IT solutions –– from big data and communications to online support and virtualization.
Visit Website
MTA

MTA

MTA
MTA was established in 1953 as a locally owned and operated Alaskan co-op and built the state’s first and only all-terrestrial network. Ampersand (an MTA subsidiary) is the leading technology services provider delivering hybrid cloud hosting solutions, cybersecurity & risk management, and more.
Visit Website
Quest Software

Quest Software

Quest Software
At Quest, we solve complex problems with simple solutions. Our philosophy is focused on great products, great service and being simple to do business with. We deliver technology that eliminates the need to choose between efficiency and effectiveness.
Visit Website
Red Canary

Red Canary

Red Canary
The Red Canary Security Operations Platform, driven by purpose-built technology, security research, and threat intelligence, provides advanced threat detection and response across your entire IT estate to improve your security outcomes.
Visit Website
ReliaQuest

ReliaQuest

ReliaQuest
ReliaQuest, a global leader in Open XDR-as-a-Service, is the force multiplier for security operations teams. ReliaQuest GreyMatter is a cloud-native Open XDR platform that brings together telemetry from any security and business solution, whether on-premises, or in one or multiple clouds, to unify detection, investigation, response, and resilience. ReliaQuest combines the power of technology and 24/7/365 security expertise to give organizations the visibility and coverage they require to make cybersecurity programs more effective.
Visit Website
Secureworks

Secureworks

Secureworks
Secureworks is a global cybersecurity leader that protects customer progress with a cloud-native security analytics platform built on 20+ years of threat intelligence, improving the ability to detect advanced threats, streamline investigations, and automate the right actions.
Visit Website
SentinelOne

SentinelOne

SentinelOne
SentinelOne is the future of Endpoint Protection. It unifies prevention, detection and response in a single platform driven by sophisticated machine learning and intelligent automation. It can adapt your defenses against the most advanced cyber-attacks.
Visit Website
Tidelift

Tidelift

Tidelift
Tidelift provides a proactive approach to managing open source effectively for application development teams. The Tidelift Subscription can improve the health, security, and resilience of your organization’s open source software supply chain.
Visit Website
Trend Micro

Trend Micro

Trend Micro
Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information.
Visit Website
TRIPWIRE

TRIPWIRE

TRIPWIRE
Tripwire delivers advanced threat, security and compliance solutions used by over 9,000 organizations, including over 50% of the Fortune 500. Tripwire enables enterprises around the world to detect, prevent, report and respond to cyber security threats.
Visit Website

BRONZE SPONSORS

Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
Arista Networks

Arista Networks

Arista Networks
Arista Networks is an industry leader in data-driven, client-to-cloud networking for large data center, campus, and routing environments. Arista’s award-winning platforms deliver availability, agility, automation, analytics, and security through an advanced network operating stack.
Visit Website
BlackBerry

BlackBerry

BlackBerry
BlackBerry Cybersecurity is a leader in endpoint security, endpoint management, encryption, and embedded systems, protecting enterprises and governments around the world. Our end-to-end approach is deeply rooted in Cylance® AI and machine learning, providing continuous preventative protection, detection, and instant response. We extend protection for your organization against current and future cyberthreats by combining network and endpoint telemetry and by delivering innovative solutions in the areas of cybersecurity, safety, and data privacy.
Visit Website

EXHIBITORS & ASSOCIATIONS

7x24 Exchange Northwest

7x24 Exchange Northwest

7x24 Exchange Northwest
Our mission is to provide an open educational forum dedicated to the continuous improvement and increased awareness of data center reliability focusing on design, security and management with the goal of obtaining continuous data center operations.
Visit Website
Ampersand

Ampersand

Ampersand
Ampersand is the leading technology services provider in Alaska delivering cybersecurity and risk management, enterprise software integration and architecture, hybrid cloud hosting solutions and more. We are tech experts and strategists who will help your organization achieve its goals.
Visit Website
ChickTech Seattle

ChickTech Seattle

ChickTech Seattle
ChickTech is dedicated to retaining women in the technology workforce and increasing the number of women and girls pursuing technology-based careers. To learn more about ChickTech visit http://seattle.chicktech.org or email us at seattle@chicktech.org.
Visit Website
ExtraHop

ExtraHop

ExtraHop
ExtraHop delivers enterprise cyber analytics that allow you to quickly investigate threats, ensure the delivery of critical applications, and secure your investment in the cloud.
Visit Website
HDI Seattle

HDI Seattle

HDI Seattle
HDI is the world’s largest IT service & technical support membership association and the industry’s premier certification and training body. Guided by an international panel of industry experts and practitioners.
Visit Website
IIBA Seattle

IIBA Seattle

IIBA Seattle
As the voice of the business analysis community, IIBA supports the recognition of the profession, and works to maintain standards and certification. The Seattle chapter supports its members through providing a community and educational opportunities.
Visit Website
InfraGard Washington

InfraGard Washington

InfraGard Washington
InfraGard is a partnership between the FBI and the private sector representing businesses, academia, state , local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the U.S.
Visit Website
ISC2 Seattle

ISC2 Seattle

ISC2 Seattle
Bringing like-minded professionals together in the Greater Puget Sound region to discuss current tactics, techniques, and procedures within cybersecurity.
Visit Website
ISSA Puget Sound

ISSA Puget Sound

ISSA Puget Sound
The Information Systems Security Association (ISSA) is a not-for profit international organization of information security professionals and practitioners.
Visit Website
Puget Sound PMI

Puget Sound PMI

Puget Sound PMI
The Puget Sound Chapter of the Project Management Institute is part of an international nonprofit professional organization dedicated to advancing project management excellence through professionalism.
Visit Website
SIM Seattle

SIM Seattle

SIM Seattle
SIM inspires the minds of the most prestigious IT leaders. Highly regarded as the premier network for IT leadership, SIM is a community of thought leaders who share experiences and rich intellectual capital, and who explore future IT direction.
Visit Website
VMUG

VMUG

VMUG
Officially launched in August of 2010, the VMware User Group (VMUG) is an independent, global, customer-led organization, created to maximize members’ use of VMware.
Visit Website
Washington Technology Industry Association

Washington Technology Industry Association

Washington Technology Industry Association
We work to build a strong, sustainable technology sector in a thriving community. We serve the Seattle and Northwest Washington region.
Visit Website
Wintellect

Wintellect

Wintellect
Wintellect, an Atmosera company, helps you drive innovation by modernizing your applications and data. We offer Cloud Managed Services to save you money, maximize up-time, and enable you to focus on business strategy rather than managing IT infrastructure. And we skill up your team to enable them to quickly apply the latest technologies in software, cloud, DevOps and data, including open source technologies like Linux and Kubernetes.
Visit Website

Interested in becoming part of our next Seattle event?

CONTACT US FOR INFO

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.