F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Seattle 2022 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Seattle EVENTS

AT A GLANCE

December 1st, 2022
8:30am – 4:30pm

Seattle Convention Center
Ballroom 6AB
705 Pike Street
Seattle, WA 98101

Directions & Parking

Venue Accessibility

Venue Health & Safety

KEYNOTE: [1 CPE] Incident Response & Recovery: What to do Before, During, & After the Storm

  Presented by Collin Miller • Director of Cloud Security, Structured

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Theater Three
  • Theater Four
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Understanding APIs and API Security Testing

  Presented by Synack

According to Gartner's July 2022 analysis of the application security space, over 80% of today’s web traffic is API traffic. As of 2022, API abuses will move from an infrequent to the most-frequent attack vector, resulting in data breaches for enterprise web applications. Hence, it is imperative that security organizations have a firm understanding of APIs and API security testing approaches.

This presentation covers:

  • Definition of an API and How APIs Work
  • Types of API Testing
  • Headless API Offensive Penetration Testing
  • API and OWASP
Topics: Information Security
10:00 - 10:50 AM

[1 CPE] How to Get the Security Budget You Deserve

  Presented by CYE

Because of the current economic downturn, security leaders are being forced to stretch their budgets further, even as devastating cyberattacks continue to proliferate. Given these challenges, how can CISOs convince their board members to support a robust and effective cybersecurity budget?

In this session moderated by Bryan Hurd, Reuven Aronashvili and Ira Winkler will highlight the best ways to stretch your security budget, including which investments will provide the most bang for your buck. Perhaps most importantly, however, Reuven and Ira will also touch on how CISOs like you can present your security recommendations and successfully receive the budget you deserve.

Topics: Strategic Management
11:00 - 11:50 AM

[1 CPE] Securing a Distributed Network with ZTNA, SASE, & a Cybersecurity Mesh Platform

  Presented by Fortinet

Securing connected resources and the different pieces of a distributed network can be challenging. Join this session to explore the advantages of using SASE and a ZTNA architecture to provide secure, application-based access over the traditional VPN access most enterprises use today. We’ll also examine how employing Gartner’s Cybersecurity Mesh Architecture can simplify Network and Security operations.

Topics: Information Security, Infrastructure
12:00 - 12:50 PM

[1 CPE] Security and Resiliency for Your Most Critical Data

  Presented by Cohesity

Join this session for a walk-through of a real-world ransomware attack and the necessary steps to recover. We will cover a cyber insurance form to show how it aligns with our “Protect, Detect, Recover” point of view, and we will speak to the specific capabilities associated with each point.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Why Smart Cities Are Safer Cities Thanks to Real-Time Data and AI

  Presented by iT1 Source & Wireless Guardian

Intelligent technology helps public safety organizations gain a holistic understanding of their cities, deepen public confidence and strengthen community connections. This session will explain the relationship the using Real-Time Data and Artificial Intelligence to create safer, more resilient communities. As part of the discussion, the presenter will explain the following:

  • Data and AI are helpful in real-time response
  • Data and AI are also reshaping long-term public safety processes
  • How smart safety technologies aid in environmental monitoring, emergency management and other situations
  • How smart technology pulls in signals from an array of sources across cities

The presenter will also stress public safety isn’t a top-down hierarchy. It’s actually a collective effort that prioritizes the needs of the community and depends on strong relationships. By realizing the future of public safety, smart city technology transforms the ability to serve local communities.

Topics: Artificial Intelligence, Infrastructure
2:00 - 2:50 PM

[1 CPE] Protecting Your Data from Ransomware Where it Lives: Your Last Line of Defense

  Presented by Hitachi Vantara

If an attack happens and it makes it all the way to your data, then they have already broken through all of your walls. Where your data lives IS your last line of defense, which is why the Armed Forces that protects the USA trusts Hitachi to protect them. Prevention is great and all but without that last line of defense, you’re a sitting duck. Attend this session to learn how Hitachi serves as your last line of defense against ransomware attacks.

Topics: Information Security
Collin MillerCollin MillerDirector of Cloud Security, Structured
3:00 - 3:50 PM

[1 CPE] Incident Response & Recovery: What to do Before, During, & After the Storm

  Presented by Collin Miller • Director of Cloud Security, Structured

Responding to a security incident requires preparation, planning, and processes. When that incident occurs in a cloud environment such as Azure, not all organizations are equipped to respond. The shared responsibility model, rapid rate of change, high degree of automation, and new security tools and technologies all present challenges and opportunities when responding to incidents in the cloud. Protect your organization’s information, applications, and reputation by learning to develop an incident response infrastructure to prepare, detect, analyze, contain, eradicate, recover, and learn from security incidents when they occur. This presentation will focus on Azure environments, but many of the lessons learned are applicable across the major cloud service providers.

Collin Miller has over two decades of experience in networking and IT security. In 2015 he hiked over 2,600mi on the Pacific Crest Trail from the Mexican border into Canada. His security journey has seen him working with a wide array of cybersecurity technologies including network security, securing mobile devices, and data loss prevention. His current area of focus is cloud security.

Topics: Business Continuity / Disaster Recovery, Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] How AI Can Think Like an Attacker

  Presented by Darktrace

In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen and to recover if compromised. In this session, we’ll unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Immutable Storage: Level-Up Ransomware Readiness

  Presented by Arcserve

Data is expected to grow to 200 ZB by the end of 2025. More data to manage, more data to protect. IDC recommends a 3-2-1-1 best practice as a mid-market data protection strategy. The addition of the new "1" is a copy of the data on immutable storage. Backup data is a key tool in business continuity & disaster recovery planning. Securing this backup data and maintaining multiple copies of it allow for a resilient recovery plan. Your cyber security plan is incomplete without a reliable recovery plan. In the event of any disaster, natural or man-made, like a ransomware attack, getting your IT systems and workloads back on their feet as fast as possible is essential. Join us as we share best practices to help keep your data protected and secure with multiple layers of defenses. We will share our perspective on how organizations can simplify the approach of incorporating guidance from NIST’s Cybersecurity Framework into their own environments.

Topics: Business Continuity / Disaster Recovery
11:00 - 11:50 AM

[1 CPE] How Search-Powered Technologies Drive Cyber Outcomes

  Presented by Elastic

There is no magic bullet in security. Yet many best practices adopted by enterprises across the globe have been proven to allow organizations to mitigate risk and mature their security posture. During this session, you will learn about common trends and challenges in cybersecurity and what organizations are doing to keep up and be ready for the future.

Topics: Information Security
12:00 - 12:50 PM

[1 CPE] Singularity XDR

  Presented by SentinelOne

The details of this presentation will be available soon. Please check back for updates!

SentinelOne is the future of Endpoint Protection. It unifies prevention, detection and response in a single platform driven by sophisticated machine learning and intelligent automation. It can adapt your defenses against the most advanced cyber-attacks.

1:00 - 1:50 PM

[1 CPE] Disrupting the Means to Prevent the End: A Guide to Detecting Ransomware

  Presented by Red Canary

Ransomware has been a dominant cybersecurity threat for the better part of the last decade. However, it doesn’t walk alone. It’s almost always the eventual payload delivered by earlier-stage malicious software or activity. Luckily, if you can detect the threats that deliver the ransomware, you can stop the ransomware before it arrives.

In this talk, we’ll extensively reference Red Canary’s 2022 Threat Detection Report, examining the malware and other malicious tools that adversaries often use to deliver ransomware. While the specific trojans and strains of ransomware may change from one attack to the next, adversary tactics, techniques, and procedures are often similar across campaigns and threats. By developing robust detection coverage for the techniques adversaries abuse most often, rather than focusing on individual threats, security teams can achieve defense-in-depth against the many threats that leverage those techniques and the broader trends that dominate the infosec landscape.

Want to learn more about the prevalent adversary techniques and threats that can lead to a ransomware infection? Attendees will leave with:

  • A better understanding of the threats and tools that commonly precede a ransomware infection
  • Guidance on relevant collection and data sources that offer visibility into the threats and techniques that adversaries use to deliver ransomware
  • Actionable information on how security teams can develop the capacity to detect, prevent, and mitigate ransomware and other threats
  • Strategies for testing their ability to observe and detect common threats with free and easy-to-use tools like Atomic Red Team
Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Who’s Attacking You?

  Presented by Critical Insight

One of the most common questions from IT Leaders and Executives is: Who would attack our organization and why?

In this discussion, we’ll examine the most common cyberattack perpetrators and their methods. From hostile Nation-States to teenagers to some threat actors you might not expect. We will discuss the methods these attackers are using to gain access to your networks, be it unpatched systems, newly found zero days, as well as other avenues into your network. Also covered will be the intent of these attacks, whether it is to steal your intellectual property, extort your cryptocurrency, or to disrupt your operation to meet strategic goals. Most importantly, we will discuss how to tell the difference, and how to protect yourself.

Topics: Business Continuity / Disaster Recovery, Data Center Technology, Data Storage, Information Security, Infrastructure, Strategic Management
  • Sessions
9:00 - 9:50 AM

[1 CPE] What to Do If You Wake Up with Ransomware

  Presented by BlackBerry Cylance

You come into work to a bunch of servers that have been infected with ransomware. Where to go from here? We’ll take you through the basic steps you need to take in the event this happens to you.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Data Protection and Disaster Recovery with a Multi-Cloud Mindset

  Presented by Cerium Networks

Explore concepts to help successfully utilize multi-cloud environments to provide cohesive backup and disaster recovery strategies. As we move to new architectures and the capabilities they provide, how do we account for compliance, data protection, and daily operations without the management chaos? Learn some key topics to ponder while moving into the new multi-cloud environments for storage, networking, governance, and compliance.

Topics: Data Center Technology
11:00 - 11:50 AM

[1 CPE] Breaking the Ransomware Attack Chain

  Presented by Akamai

Despite consistent increases in security spending, ransomware remains an ever-growing threat to businesses. Surprisingly, the ransomware itself, the malware that does the encryption, is only a part of a larger, equally dangerous, attack chain. Considering the entire chain offers defenders more opportunities to thwart the attack before mass encryption can occur.

In this session, we’ll provide details on how microsegmentation can prevent adversarial techniques that precede and follow the deployment of ransomware itself. By turning our attention to the entire kill chain, a path towards minimizing the likelihood, impact, and recovery time of ransomware becomes clear.

In this session you will learn:

  • Practical steps you can take to disrupt the kill chain before ransomware can be deployed
  • How to leverage AI to map complex environments and expedite the path towards policy enforcement that drastically reduces the impact of ransomware
  • How advancements in host-based segmentation are helping businesses achieve an infrastructure that enables rapid remediation of ransomware events without disrupting business operations

Join Speaker Chris McIntosh, GCSA/GCSE SE Akamai Segmentation

  • Sr Solutions Engineer, Pacific Northwest Akamai Segmentation
  • 19 years working in IT, last 4+ focused in Networking, Security
  • Positions include Support, Admin and Systems Engineer
  • Networking, Storage, Security, and Backup background
Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Zero-Trust Architectures

  Presented by Rubrik

Organizations have invested heavily in IT security, attempting to fortify their perimeter, network, endpoint, and application protections. Despite these investments, hackers are successfully penetrating these defenses and targeting enterprise data, including backup data. Ransomware is starting to specifically target online backups by encrypting or deleting them. If your organization was the target of an attack today, how do you know what data was impacted and where? Manually sifting through millions of files and comparing each snapshot consumes FTE time and prolongs recovery exponentially. Mass restores of the entire environment could mean high data loss and weeks' worth of work down the drain. In this session, we will discuss how to protect your last line of defense, the backups. We will walk through the anatomy of a recovery, the best practices, and advanced tools to ensure you will not have to pay a ransom, and how to quickly recover your data to continue business operations.

Topics: Business Continuity / Disaster Recovery, Information Security
2:00 - 2:50 PM

[1 CPE] Cyber Security: A National Threat

  Presented by Arctic Wolf

When searching for vulnerable targets, cyber hackers do not care how big or small your company is. As world events continue to unfold in China and Russia, cyber warfare has become a national threat to American companies.

Join Arctic Wolf's session to learn how IT leaders can be proactive, rather than reactive to protect their companies from cyber hackers.

Topics: Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] SecOps & NetOps: Team Up to Improve Security in a Recession-Friendly Way

  Presented by Infoblox

While the future economic impact on IT budgets is unclear, one thing is clear: attackers will not slow down and may even ramp up knowing organizations are considering lowering IT and cybersecurity spending. It is clear enterprise security is of extreme importance and making investments stretch is going to become essential. Core network services you already have in place, including DNS, DHCP, and IPAM (IP Address Management) are often overlooked in the cybersecurity world but can become the most powerful weapon against attackers. During this session, you will learn how to leverage existing services to:

  • Reduce the burden on existing security investments, extending their capacity and lifespan
  • Combat up to 92% of malware and ransomware without new security tools
  • Decrease SecOps investigation time by up to 60%
  • Improve your security posture, lowering cyber insurance costs
Topics: Information Security
10:00 - 10:50 AM

[1 CPE] The Top 10 List: Ransomware Preparation

  Presented by Tonaquint Data Center

Carl Wilkins, Director of Cloud Operations for Tonaquint Data Centers provides a Top 10 list of things you can do to mitigate the risk of Ransomware affecting you. Topics will include how to protect your data, how to protect your systems and infrastructure, and situations to be aware of that might indicate the presence of Ransomware in your environment.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] 4G / 5G Network Security

  Presented by Cradlepoint

Protecting organizational infrastructure, networks, and hardware devices is a never-ending pursuit these days. There is a secure network solution that offers a simple-to-manage alternative to complex VPN infrastructures for securely connecting sites, vehicles, IoT, and remote workers. This session will cover how to secure remote sites with ease, reduce attack surfaces by building undiscoverable network resources, and provide any-to-any connectivity. Learn how to unlock operational agility through built-in tunnel orchestration and simplified configuration. It’s all about end-to-end WAN and network security services that tightly integrate with routing and security devices to establish encrypted connections to access applications and resources in the cloud or data center.

Topics: Information Security, Infrastructure
1:00 - 1:50 PM

[1 CPE] Pen Testing Pitfalls to Avoid

  Presented by Secureworks

Why make the same mistakes others have already made? Using real-life examples of missteps made by other companies, you will learn what you can do to have a successful penetration test and maximize learnings.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Top 5 Ransomware Myths: What the Evolution of Ransomware Means for Businesses

  Presented by Bitdefender

2021 was “the year of ransomware.” But so were 2017, 2018, 2019, and 2020 – and so far, 2022 is not very different. Ransomware is no longer a problem discussed only in the cybersecurity and tech communities – it is now a regular topic in mainstream media headlines and executive board meetings.

So why is ransomware such a menace, and why can we not seem to get rid of it? One of the reasons is that we seem to miss the continued evolution of ransomware. We keep preparing for the last war. Ransomware in 2022 is very different than ransomware in 2017, yet we still treat it the same way.

Dan Russell, Director of Engineering, will help you to learn more about:

  • Ransomware evolution and what we need to un-learn to effectively combat it
  • The most common myths, misunderstandings, and misconceptions about ransomware and the threat actors behind it
  • The most effective tips to become more cyber resilient and prevent security incidents from turning into catastrophic breaches
Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Scott Benson
Manager, Systems
Mud Bay

Shannon Boldt
Manager, Information Systems
Point No Point Treaty Council

Di Brown
Director, Agency Technology
Puget Sound Educational Service District

Shawn Cook
Director, Technology
Prosser School District #116

Tim Crawford
Executive Director, ITS
Federal Way Public Schools

Ren Guardiano
Director, IT Business Services
Seattle Children’s Hospital

Dean Haverstraw
Director, Information Technology
Samson Inc.

Bob Johnson
Director, Information Services
Turner Construction Group

Mike Juhl
Manager, Security, Integrity and Risk
WA Employment Security Dept

Daniel Lungu
Sr Manager, Network Infrastructure
Regal Logistics

Lupe Mejia
Technology Administrator
Yakima County

Brian Moore
Director, Information Technology
Tacoma-Pierce County Health Department

Ward Naf
Director, Information Technology
Whatcom Community College

Ashley Riggs
Manager, IT Operations
City of Auburn, WA

Michael Secright
Chief Information Officer
HFS University of Washington

Skylar Shaw
Director, Information Technology
Zetec

Eddy Sherman
Manager, Computer & Network Services
WA Kitsap County

Timothy Stern
Manager, Information Security
Volkswagen Automotive Cloud

Harald Upegui
Director, Information Security
HealthPoint

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

SILVER SPONSORS

Akamai

Akamai

Akamai
Akamai is the leading content delivery network (CDN) services provider for media and software delivery, and cloud security solutions.
Visit Website
Arcserve

Arcserve

Arcserve
Arcserve is a global top 5 data protection vendor with best-in-class solutions that manage, protect, and recover all data workloads, from SMB to enterprise and regardless of location or complexity. A 100% channel-centric organization, Arcserve has a presence in over 150 countries, with 19,000 channel partners and 235,000 customers.
Visit Website
Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
Bitdefender

Bitdefender

Bitdefender
Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide. Guardian over millions of consumer, business, and government environments, we are the industry’s trusted expert for eliminating threats, protecting privacy and data, and enabling cyber resiliency.
Visit Website
BlackBerry

BlackBerry

BlackBerry
BlackBerry Cybersecurity is a leader in endpoint security, endpoint management, encryption, and embedded systems, protecting enterprises and governments around the world. Our end-to-end approach is deeply rooted in Cylance® AI and machine learning, providing continuous preventative protection, detection, and instant response. We extend protection for your organization against current and future cyberthreats by combining network and endpoint telemetry and by delivering innovative solutions in the areas of cybersecurity, safety, and data privacy.
Visit Website
Cerium Networks

Cerium Networks

Cerium Networks
Cerium is a recognized innovator and leading provider of a full suite of collaboration, contact center, networking, data center, and security solutions. We help medium to large businesses in the Northwest plan for and then realize the positive impact of technology on their business operations, strategies, and user experiences.
Visit Website
Cohesity

Cohesity

Cohesity
Cohesity delivers a web-scale platform that simplifies data protection, consolidates file and object services, provides instant access to test/dev copies, spans from the edge to the cloud, and performs in-place searches and analytics.
Visit Website
Cradlepoint

Cradlepoint

Cradlepoint
Cradlepoint enables the freedom to connect people, places, and things that drive more experiences, more ways to work, and better business results — anywhere. The company is a pioneer in Wireless WAN, offering advanced 4G and 5G routers and adapters — controlled through Cradlepoint NetCloudTM. Organizations rely on Cradlepoint and its Cellular Intelligence to build a reliable, secure network for fixed and temporary sites, vehicles, IoT devices, and remote employees. Headquartered in Boise, Idaho, Cradlepoint is a subsidiary of Ericsson’s Business Area Enterprise Wireless Solutions division. It has international offices in Asia Pacific, Canada, Europe, India, and Latin America.
Visit Website
Critical Insight

Critical Insight

Critical Insight
Critical Insight defends your critical assets, so you can achieve your critical missions. We augment and amplify your team with our team and defend your organization with a personalized blend of MDR, managed, and professional services to assess, test, and monitor 24x7. Critical Insight. We Defend. You Thrive.
Visit Website
CYE

CYE

CYE
CYE’s cybersecurity optimization platform enables businesses to assess, quantify, and mitigate cyber risk so they can make better security decisions and invest in effective remediation. CYE combines this with dedicated professional guidance and advice provided by established cybersecurity experts. The company serves Fortune 500 and mid-market companies in multiple industries around the world. With headquarters in Israel and offices in New York and London, CYE is funded by EQT Private Equity and 83North.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
Elastic

Elastic

Elastic
Elastic delivers cloud-native enterprise search, observability, and security solutions that enhance customer and employee search experiences, keep mission-critical applications running smoothly, and protect against cyber threats.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet helps organizations across the public and private sectors protect the systems, data, and services that keep businesses and communities running. From government agencies and schools to enterprises and service providers, leaders rely on Fortinet to secure critical infrastructure, ensure operational continuity, and defend against evolving cyber threats. Our Security Fabric platform unifies networking and security to deliver the visibility, control, and efficiency organizations need to operate confidently, whether virtual, in the cloud, or on-premises.
Visit Website
Hitachi Vantara

Hitachi Vantara

Hitachi Vantara
Hitachi Vantara helps enterprises create and derive value from their data. Its solutions include best-in-class data management, IT infrastructure and analytics products, IoT solutions and Smart Spaces technologies for a broad range of industries.
Visit Website
Infoblox

Infoblox

Infoblox
Infoblox unites networking and security to deliver unmatched performance and protection. Trusted by Fortune 100 companies and emerging innovators, we provide real-time visibility and control over who and what connects to your network, so your organization runs faster and stops threats earlier.
Visit Website
iT1 Source

iT1 Source

iT1 Source
Since 2003, iT1 Source has provided a wide range of IT solutions –– from big data and communications to online support and virtualization.
Visit Website
Red Canary

Red Canary

Red Canary
The Red Canary Security Operations Platform, driven by purpose-built technology, security research, and threat intelligence, provides advanced threat detection and response across your entire IT estate to improve your security outcomes.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website
Secureworks

Secureworks

Secureworks
Secureworks is a global cybersecurity leader that protects customer progress with a cloud-native security analytics platform built on 20+ years of threat intelligence, improving the ability to detect advanced threats, streamline investigations, and automate the right actions.
Visit Website
SentinelOne

SentinelOne

SentinelOne
SentinelOne is the future of Endpoint Protection. It unifies prevention, detection and response in a single platform driven by sophisticated machine learning and intelligent automation. It can adapt your defenses against the most advanced cyber-attacks.
Visit Website
Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website
Synack

Synack

Synack
Synack’s premier on-demand security testing platform harnesses a talented, vetted community of security researchers and smart technology to deliver continuous penetration testing and vulnerability management, with actionable results. We are committed to making the world more secure by closing the cybersecurity skills gap, giving organizations on-demand access to the most-trusted security researchers in the world.
Visit Website
ValorC3

ValorC3

ValorC3
ValorC3 is a modern data center, cloud and connectivity partner that delivers agile, scalable IT solutions tailored to the relentless mid-market enterprise. Valor meets clients where they’re at and gets them where they need to grow, helping them navigate the rapidly changing digital landscape with flexible, high-density data centers, extensive infrastructure expansion capabilities, low latency networks, strong partnerships and decades of industry expertise.
Visit Website

BRONZE SPONSORS

3R Technology

3R Technology

3R Technology
Providing complete ITAD services since 2003, including state-of-the-art secure data destruction, refurbishment, and e-commerce solutions. Our R2:2013 and NAID AAA certifications guarantee environmental safety and sustainability, while ensuring your data and assets are managed responsibly.
Visit Website
Everpure

Everpure

Everpure
Create an Enterprise Data Cloud that unifies access, simplifies management, and unlocks the value of your data—only with the Everpure platform.
Visit Website
ExtraHop

ExtraHop

ExtraHop
ExtraHop delivers enterprise cyber analytics that allow you to quickly investigate threats, ensure the delivery of critical applications, and secure your investment in the cloud.
Visit Website
Extreme Networks

Extreme Networks

Extreme Networks
Extreme Networks, Inc. (EXTR) delivers software-driven networking solutions that help IT departments everywhere deliver the ultimate business outcome: stronger connections with customers, partners and employees.
Visit Website
GCSIT

GCSIT

GCSIT
GCSIT is a different kind of engineering firm. We act as your personal technology optimization team to create and maintain custom-built, agile infrastructure. We help you transition to the right technology solutions to better handle complex and dynamic challenges.
Visit Website
Keysight

Keysight

Keysight
Keysight delivers advanced visibility and validation solutions to connect and secure the world.  Visibility solutions (network packet brokers, taps and CloudLens) eliminate security blind spots in hybrid networks. Threat Simulator continuously validates enterprises’ security architectures to ensure they are working as defined to detect and stop threats.
Visit Website
Tanium

Tanium

Tanium
Tanium gives the world's largest enterprises and government organizations the unique power to secure, control and manage millions of endpoints across the enterprise. 
Visit Website

EXHIBITORS & ASSOCIATIONS

Armis

Armis

Armis
Armis is the global leader in cyber asset security. Fortune 500 companies trust our real-time, comprehensive asset intelligence to deliver full visibility and automated enforcement across every connected asset and environment. Armis helps organizations across any industry continuously secure their entire cyber-asset attack surface.
Visit Website
Axonius

Axonius

Axonius
Axonius is an asset inventory management platform that focuses on cybersecurity solutions and policies.
Visit Website
baramundi

baramundi

baramundi
baramundi Software offers efficient, secure, and cross-platform management of workstation environments. With over 20 years of UEM experience across the globe, over 4,000 customers benefit from our intuitive, single-interface platform.
Visit Website
Blumira

Blumira

Blumira
Blumira’s detection and response platform helps organizations of all sizes quickly stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Blumira’s free edition allows you to gain visibility into your Microsoft 365 environment within minutes. No credit card or sales conversation required. Get started for free today at blumira.com/free.
Visit Website
Business Telecom Products

Business Telecom Products

Business Telecom Products
Over 80% of wireless headsets are replaced needlessly because people don’t know how to care for them or fix minor problems. BTP, your NW Plantronics Authorized Distributor, provides free support, resulting in huge IT savings and fewer headaches.
Visit Website
C1

C1

C1
C1 is the premier IP-enabled, services-led, customer experience solutions provider. Over 10,000 customers use us to help them build meaningful connections.
Visit Website
CSA Seattle

CSA Seattle

CSA Seattle
The Cloud Security Alliance (CSA) is a non-profit with a mission to promote best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing.
Visit Website
InfraGard Washington

InfraGard Washington

InfraGard Washington
InfraGard is a partnership between the FBI and the private sector representing businesses, academia, state , local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the U.S.
Visit Website
ISSA Puget Sound

ISSA Puget Sound

ISSA Puget Sound
The Information Systems Security Association (ISSA) is a not-for profit international organization of information security professionals and practitioners.
Visit Website
JT Tech

JT Tech

JT Tech
JT Tech is a Washington State based business that provides a personal level of partnership extending the highest level of a secure IT solution. We help our customers gain a competitive advantage with Network Infrastructure and Security Solutions.
Visit Website
LogicMonitor

LogicMonitor

LogicMonitor
At LogicMonitor, we expand what’s possible for businesses by advancing the technology behind them.
Visit Website
Matrix Networks

Matrix Networks

Matrix Networks
Helping businesses both big and small accomplish their IT and communication goals by delivering innovative technologies supported by integrity, reliability, and genuine customer care.
Visit Website
NETSCOUT

NETSCOUT

NETSCOUT
The complexity of our connected world is soaring at rates never before seen, creating problems nearly impossible to find. As Guardians of the Connected World, it is our collective mission to secure and assure the performance of our digital ecosystems - across any application, any cloud, any data center. Our patented Smart Data technology and continuous monitoring was engineered to penetrate the countless layers of services, applications, and hybrid cloud servers that comprise your digital architectures. Identify problems with precision and solve them with confidence.
Visit Website
Okta

Okta

Okta
Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology— anywhere, on any device or app. Organizations trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, government, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations.
Visit Website
Optm

Optm

Optm
Optm is a multinational technology company providing platform and software solutions that optimize people, technology, and management.
Visit Website
Origina

Origina

Origina
Origina is a Gartner recommended third-party IBM and HCL software support and maintenance provider that offers large organizations a forward-thinking alternative to traditional software megavendors. Its multi-layer, expert led, consultative offering delivers immediate cost savings, recovers the value locked in traditional systems, de-risks legacy environments and frees valuable resources that companies can use to accelerate cloud and digital transformation programs.
Visit Website
Qumulo

Qumulo

Qumulo
Qumulo, the leader in data-aware scale-out NAS, helps CIOs and storage administrators store, manage and curate enormous numbers of digital assets.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website
Wireless Guardian

Wireless Guardian

Wireless Guardian
Wireless Guardian is the world’s first forward-facing human threat detection system and the most effective investigative security solution for today’s high-tech environment. Providing protection to patrons and facilities, Wireless Guardian tracks security threats up to a mile outside the facility’s perimeter. The operational effectiveness of Wireless Guardian is the ability to vet every Pedestrian, device, RFID tag, iOT device, and vehicle.
Visit Website
Wowrack

Wowrack

Wowrack
Wowrack is a global cloud service provider; offering various Hosting services including Managed Hosting Solutions, Dedicated Server Solutions, Colocation, Virtualization, Disaster Recovery, Backup services and much more!
Visit Website

Interested in becoming part of our next Seattle event?

CONTACT US FOR INFO

Seattle

Seattle Convention Center
Ballroom 6AB
705 Pike Street
Seattle, WA 98101

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.