F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Seattle 2023 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Seattle EVENTS

AT A GLANCE

December 7th, 2023
8:30am – 4:30pm

Seattle Convention Center
Ballroom 6BC
705 Pike Street
Seattle, WA 98101

Directions & Parking

Venue Accessibility

KEYNOTE: [1 CPE] Do You Know What You Don’t Know and Why Don’t You Know It

  Presented by Ronald Watters • Cybersecurity Advisor, Cybersecurity and Infrastructure Security Agency

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Theater Three
  • Theater Four
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] The Most Important Shift for Cybersecurity in a Generation

  Presented by Steve Riley, Field CTO • Netskope

We live in a world where everything is hybrid and the blend between personal, corporate, private, and public is ever-changing and presents us with a host of new challenges. This has increased and complicated the attack surface and the pressure to converge tools and do “more with less” is at peak levels. We must meet this watershed moment with the right team, plans, and technology.

Join this interactive session to learn:

  • How to build an effective plan for change without adding to the chaos
  • What consolidation approaches save money without sacrificing security
  • Use cases that deliver immediate value and efficiency while improving user experience

Steve Riley is a Field CTO at Netskope. Having worked at the intersection of cloud and security for pretty much as long as that’s been an actual topic, Steve offers that perspective to field and executive engagements and also supports long-term technology strategy and works with key industry influencers. A widely renowned expert speaker, author, researcher, and analyst, Steve came to Netskope from Gartner, where for five years he maintained a collection of cloud security research that included the Magic Quadrant for Cloud Access Security Brokers and the Market Guide for Zero Trust Network Access. Before Gartner, Steve spent four years as Deputy CTO of Riverbed Technology and held various security strategy and technical program management roles at Amazon Web Services for two years and at Microsoft for eleven years. Steve's interest in security began all the way back in 1995 when he convinced his then-employer that it would be a good idea to install a firewall on their brand-new internet connection.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] The SMB’s Playbook for Cybersecurity in 2024

  Presented by BlackPoint IT Services

The SMB's Playbook for Cybersecurity in 2024 speaking session offers a concise yet comprehensive overview of the cybersecurity landscape tailored for small and medium-sized businesses. This presentation traverses the evolution of digital threats, providing insights into past trends and current challenges while forecasting future risks. It emphasizes practical strategies for proactive defense and effective incident response. Attendees will learn about the latest advancements in cybersecurity, gain knowledge on managing cyber incidents, and understand the importance of building a cybersecurity-aware culture. This session is vital for SMBs seeking to enhance their digital resilience against the backdrop of an ever-evolving cyber threat environment.

Speakers:

Andrew Hutchison, Director of Service Delivery at BlackPoint IT Services
Sean Banahan, Director of US Channel Sales at WatchGuard

Topics: Business Continuity / Disaster Recovery, Information Security
11:00 - 11:50 AM

[1 CPE] Exploring the Anatomy of Modern-Day Breaches

  Presented by Tim Medin, CEO • Red Siege

Join this presentation for a comprehensive overview of modern cybersecurity threats and how breaches occur. We will highlight the various methods used by cybercriminals, including phishing, social engineering, and ransomware attacks, and emphasize the importance of identifying and addressing vulnerabilities before they can be exploited. Throughout the presentation, we'll discuss the importance of a proactive approach to cybersecurity, including regular security assessments, penetration testing, and vulnerability scanning, as well as education and training for employees to recognize and report suspicious activity. There are a lot of vulnerabilities in the wild, and IT administrators and security professionals often focus on the wrong issues because they are easier to monitor or measure. By the end of the presentation, you will have gained valuable insights into the latest cybersecurity threats and how to protect against them.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Security Trends & Predictions

  Presented by Peter Ingebrigtsen, Sr Technical Marketing Manager • Arctic Wolf

In a dynamic cybersecurity landscape and fast-paced market, organizations grapple with ever-changing threats. Uncertainty abounds as they seek to benchmark themselves against their peers and prioritize initiatives. Join Arctic Wolf to explore key areas organizations are focusing on, top threat concerns, and responses by established organizations to emerging threats. Leveraging Arctic Wolf research, we'll further present five critical security predictions for the next 12 months.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Panel: Retaining Your IT Staff in Seattle, How it Can Be Done!

  Presented by INTERFACE Advisory Council

“The other company is offering higher wages. I get to work remotely as much as I want and get a four-day workweek. Sorry, but I must take it.” Have you heard this just a few times? So many IT hiring managers are having to find creative ways to keep staff members in-house. While budgets and major company overhauls can’t always be achieved, some methods can help. 

Join the INTERFACE Advisory Council for an open conversation on how to keep your local IT staff intact. This panel features local IT hiring managers and leaders dealing with these challenges in their shops. Bring your questions as there will be an opportunity to get advice on your specific needs. 

Moderator: Tony North, Sr Manager of IT Services, King County, Washington

Panelists:

  • Yasmin Karimli, Vice President, Strategic Transformation, T-Mobile
  • Brian Moore, Director, Information Technology, Tacoma-Pierce County Health Dept
  • Tony Sheehan, Director, Information Services, Seattle Convention Center
  • Artem Zakharchenko, Senior Vice President, Robert Half
Topics: Culture
Ronald WattersRonald WattersCybersecurity Advisor, Cybersecurity and Infrastructure Security Agency
3:00 - 3:50 PM

[1 CPE] Do You Know What You Don’t Know and Why Don’t You Know It

  Presented by Ronald Watters • Cybersecurity Advisor, Cybersecurity and Infrastructure Security Agency

The Cybersecurity landscape changes daily. Keeping up with the latest threats, solutions, and strategies always keeps technology professionals busy. Part of any good cybersecurity strategy is to be as prepared as possible with an incident response plan. Your Cyber Resilience can be improved by better planning and utilizing all possible resources.

In this session, we will discuss the unknown and less thought-about areas of Cybersecurity and Resilience. The Cybersecurity and Infrastructure Security Agency (CISA) provides free resources to companies and agencies of all sizes. Join us to learn about the tools available to you.

Ron serves as the Region 10 Private Sector Cybersecurity Advisor for the Cybersecurity and Infrastructure Security Agency. Based in Seattle, WA, he supports the Department of Homeland Security (DHS) mission of strengthening the security and resilience of the nation's critical infrastructure.

His program coordinates cyber preparedness, risk mitigation, and incident response, and provides cyber security resources, including assessments, to the nation’s sixteen critical infrastructure sectors and state, local, tribal, and territorial government entities.

Prior to joining DHS, Ron served 27 years with the U.S. Navy and Naval Reserve as a Submarine Sonar Technician and Diver. Finding not much use for a Submarine Sonar Technician in the Surface reserve Ron utilized his talents as an Intelligence Analyst and was utilized accordingly. Ron retired from the US Navy in 2007. During his active duty, Ron completed his bachelor’s degree in public administration with Criminal Justice emphasis (Cum Laude). He completed his two master’s degrees in education (School Administration and Secondary Education) at Loyola Marymount University. He continued his education and achieved certification as a Microsoft Certified Systems Engineer and Microsoft Certified Trainer, he was hired as the Computer Science Department Chairman at Chaminade College Preparatory High School in West Hills, CA until he was recalled to Active duty following 9/11. Upon his demobilization, he was offered a position as the Deputy, Information Systems Management Officer with the 4th Marine Corps recruiting District in New Cumberland, PA. He rose to the position of S-6 before leaving in 2009 to take a position as the Chief of the Information Assurance Division, Network Enterprise Center Ft Irwin, CA. Ron remained in that position until he left to become the Branch Manager of the Cybersecurity Branch of the Puget Sound Naval Shipyard in March 2016. Ron interviewed and was hired as the Region X Cybersecurity advisor in June of 2017 and has filled that position presently.

Ron’s computer certifications are numerous including Microsoft Certified Systems Engineer (MCSE), Certified Novell Administrator (CNA), GIAC Security Leadership Certification (GSLC), CompTIA Security+ CE, and Microsoft Certified Trainer (MCT). In addition to the professional certifications, Ron has been awarded numerous Commander’s Coins for excellence and received Two Commander’s Awards for his work at Fort Irwin.

  • Sessions
9:00 - 9:50 AM

[1 CPE] Unleashing the Power of the Microsoft Power Platform

  Presented by Marie Stavish, BAI Engineer • Univision Computers

Join this session as we explore the business value of the Microsoft Power Platform and discover how it can empower any organization. Our learning objectives for this session are comprehensive, ranging from understanding the fundamental concepts of Power Platform to diving into its integration with Microsoft 365 apps and services. We will explore connectors, data organization with Microsoft Dataverse, collaboration through Microsoft Teams, synergies with Dynamics 365, and even harnessing the power of Azure Services. Additionally, we will discuss how Power Platform apps work together seamlessly to create efficient solutions that boost productivity. So, fasten your seatbelts, as we unravel the potential of Microsoft Power Platform.

Topics: Infrastructure
10:00 - 10:50 AM

[1 CPE] Zero Trust—Let’s Dive into Security

  Presented by Kevin Heide, Director of Enterprise Networking • Cerium Networks

Spend the morning with us while we explore the world of Zero Trust Architecture—but with a twist. Instead of a high-level overview of this strategic cybersecurity approach, we'll get hands-on and show you practical examples using tools and environments that most of us are already familiar with.

Buckle up and join us on this exciting journey as we learn how to integrate different elements and policies across our organizations. We'll also focus on optimizing our policies and enhancing threat protection.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Modern Segmentation Architectures

  Presented by Joe Lentz, Systems Engineer • Arista Networks

In this presentation, we will explore the different network segmentation models available, including VLANs, VRFs, and group-based segmentation models.

We will begin with an overview of the different segmentation models and discuss their benefits and drawbacks. VLANs provide a simple way to segment traffic but do not scale well in larger environments. VRFs offer more robust isolation but can be complex to manage. Group-based segmentation models offer a flexible and scalable way to segment traffic based on the endpoint itself rather than the network. We will discuss the implementation and configuration of each of these models and provide examples of how they can be used in different scenarios.

Next, we will discuss how EVPN with either VXLAN or MPLS transport can be used as an attachment point to allow for segmentation to cross the network device boundary and become a network-wide policy.

Finally, we will compare the different models to help you choose the best segmentation approach for your network, as well as how to layer these together to have a more complete design. By the end of this presentation, you will have a better understanding of modern segmentation architectures and be equipped to make informed decisions for your network.

Topics: Data Center Technology, Information Security, Infrastructure
12:00 - 12:50 PM

[1 CPE] The Ukrainian Paradox

  Presented by Jerry Petru, President • InfraGard Washington

This session is designed for individuals interested in interrogating the far-reaching cybersecurity impact of the war in Ukraine. We will cover how to prepare your organization for a bad day; what combat electronic warfare is and whether it is different from cybercriminal activity; the tactics and techniques of a cyber guerrilla force; how drones are changing the attack vector of security; and why having a detailed action plan for incident response is critical and where to find reliable information. This presentation is based on facts and information gathered by a former US Army Special Force Operator (Green Beret) who has family and friends in Ukraine. This session will be an open and free-flowing discussion of real-world issues; attendees are encouraged to ask questions.

Bio: Jerry Petru is the President of the Washington State InfraGard Chapter and a Fellow of the British Computer Society, The Charted Institute for IT. He is an innovative and technically sophisticated professional, offering substantial years of broad-based experience in evaluating large corporate systems. Powered with a comprehensive background in development and implementation, he has authored more than forty-seven different courses based on AIX, Encryption, Linux, Networking, Security, and Virtualization technologies teaching to an audience of tens of thousands around the world for the past twenty-five years.

Mr. Petru is equipped with a proven track record of success in designing and implementing systems and policies based on Confidentiality, Integrity, and Availability to meet business continuity and disaster recovery for long-range strategic plans of Fortune 100 Companies. He is also armed with stellar qualifications in all facets of project lifecycle development, from initial analysis and conceptual design to implementation, quality review, and enhancement to optimize operational efficiencies that improve business and IT operations.

Topics: Information Security, Strategic Management
1:00 - 1:50 PM

[1 CPE] Navigating the Tech Terrain: Microsoft’s Evolution, Copilot’s Journey, and Apple’s Intriguing Intersection

  Presented by Alex Esterly, Sr Solutions Architect • iT1 Source

In this session, we will explore the latest developments in the Microsoft space, focusing on how these innovations will empower businesses. Microsoft is at the forefront of increasing productivity with new updates leveraging Artificial Intelligence (AI) and Machine Learning (ML) that cater to user-centric technology. One key highlight is the ability to seamlessly integrate and manage both Microsoft and Apple devices, providing comprehensive support for a diverse and evolving workforce. Join us for an insightful discussion on the trending conversations in the tech world and discover how Microsoft is shaping the future of business enablement.

2:00 - 2:50 PM

[1 CPE] How AI Can Think Like an Attacker

  Presented by Darktrace

In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks across all areas of their digital environment. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

Topics: Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] What to Do If You Wake Up with Ransomware

  Presented by Ross Rosenzweig, Senior Manager, Sales Engineering • BlackBerry Cybersecurity

You come into work to a bunch of servers that have been infected with ransomware. Where to go from here? We’ll take you through the basic steps you need to take in the event this happens to you.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Data Backup Best Practice for SMEs

  Presented by Jane Garrity, Director Channels, North America • Macrium Software

Data is one of the most valuable resources in the world, so doesn’t it make sense to keep such an important asset safe? In the same way that businesses insure physical assets and employees, backup protects data. As life is unpredictable and people can make mistakes, whether a natural disaster, hardware failure, or an employee accidentally infecting your network with a nasty virus, having current backups gives you peace of mind. In this session, we will review the proactive approach to data loss.

We will provide a broad yet critical overview of data protection, which will require us to discuss how data is imperative to business operations. We’ll cover the everyday risks to your business’s data, the consequences of data loss, and the significance of developing a data backup plan. We approach topics like understanding your business needs, analyzing the data backup types and methods, and knowing how to equip your teams for data backup and recovery best practices. As a trustworthy and reliable leader in backup software protection, Macrium Software is delighted and compelled to explore backup that can scale to meet the needs of your business.

Topics: Data Storage, Information Security
11:00 - 11:50 AM

[1 CPE] Data Resiliency, Heightened Cyber Threats, & Proving Your Capabilities for Cyber Insurance

  Presented by Kashif Naqvi • Cohesity

Join this session for a walk-through of a real-world ransomware attack and the necessary steps to recover. We will cover a cyber insurance form to show how it aligns with our “Protect, Detect, Recover” point of view, and we will speak to the specific capabilities associated with each point.

Topics: Data Storage, Information Security
12:00 - 12:50 PM

[1 CPE] Modernizing Your DR Strategy

  Presented by Scott Hetrick, Pre-Sales SE Manager NAM • Quest Software

Creating a DR plan is a must. Understanding where to begin and where you want to be can offer challenges. We must start at the beginning which entails bringing in all stakeholders and understanding the Data. Many times, it’s obvious that there are power failures, server failures, DB failures etc. However, we must understand the value of the data in each department. During this presentation, we'll focus on how to create a DR plan with the Data being centric. By looking at things from this perspective you'll better understand the value of the data which will allow you to create a DR plan that incorporates immutability and storage.

Topics: Data Storage
1:00 - 1:50 PM

[1 CPE] Email Archiving and Security Compliance

  Presented by BlackPoint IT Services

In today's data-driven world, email has become an indispensable tool for communication and collaboration. However, the sheer volume and sensitivity of email data pose significant challenges for organizations seeking to ensure data integrity, maintain compliance, and safeguard against cyber threats. In this presentation, we will delve into the intricacies of email archiving and security compliance, providing you with a comprehensive understanding of the essential principles and practical strategies for effective email management.

Topics: Data Storage, Information Security
2:00 - 2:50 PM

[1 CPE] Backup ≠ Cyber Recovery

  Presented by Matthew Sheehan, Enterprise Sales Engineer • Rubrik

Legacy backups are vulnerable to attacks, can’t help you find threats, and force you to do wholesale restores that drag out recovery times. Rubrik Zero Labs found that only 5% of organizations were able to return to business continuity or normal operations within one hour of discovering a CyberAttack. A modern cyber recovery solution is critical for Security and IT teams to be cyber-resilient. Learn how you can make your data indestructible.

Topics: Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] Cybersecurity and Compliance For Winter 2023/2024

  Presented by Rob Wayt, Director of Governance, Risk & Compliance • Structured Communication Systems

The cybersecurity regulatory compliance landscape has never been more complicated, and this presentation will provide information and updates to CMMC, GLBA, PCI, TSA, generative AI and security best practices. This discussion will focus on security solutions to these challenges, including penetration testing and zero trust implementations.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Why is Critical Data Being Compromised?

  Presented by Thales Group

Securing critical data and information was where this industry started a long time ago, but it became more challenging with the rapid growth of enterprise data in an interconnected world. The pandemic forced organizations to support a remote workforce and expose critical systems that were once only accessible from inside the company’s network. We’ve increased the attack surface and the number of vulnerabilities which has led to more data breaches. With the technology advancements in access management, data discovery and encryption we can once again shift the focus to securing our data and information. In this presentation, we will discuss a unified data-centric security approach and strategy to protecting your most critical data and information.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] How to Stop East/West Attacks in Your Data Center

  Presented by Aruba Networks

70% of all breaches are caused by endpoint security vulnerabilities, followed by lateral movement in the data center. Halt that hacker traffic. Attend this session to learn about a new category of data center switch that combines best-of-breed L2/3 switching with the industry's first hardware-accelerated programmable processor. This new tool augments your malware and ransomware detection and response capabilities by delivering stateful firewall services inline, at scale, with wire-rate performance and orders of magnitude improvement over traditional data center L2/3 switches. You will learn how to gain visibility and enforce security policy for all East/West flows between workloads to protect the critical assets in your data center.

Topics: Data Center Technology
1:00 - 1:50 PM

[1 CPE] Seeing Your Attack Surface Through the Eyes of an Adversary

  Presented by Kraig Faulkner, Channel Systems Engineer - Cortex • Palo Alto Networks

Modern attack surfaces are dynamic. Without clear visibility that is constantly updated, it is all too easy to have persistent exposures and unmanaged assets. Security practitioners can only be as good as the data they have, so having a strong foundation of continuous discovery and monitoring ensures you can keep up with modern, dynamic attack surfaces to find, prioritize, and mitigate exposures as they arise.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Modernizing Physical Security

  Presented by Verkada

In this session, we’ll look at the technologies at the forefront of enterprise building security. Connected security devices can provide users with real-time insights and a full picture of the health and safety of their environments. We’ll explore how to minimize security risks, workplace frustrations, and costly inefficiencies with best–in–class solutions that provide a scalable way to easily configure, monitor and respond to events from anywhere. Learn how modernizing your physical security can help you seamlessly safeguard the physical world –– without sacrificing privacy –– to operate safer, smarter buildings.

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Robert Austin
Director, Cybersecurity
AT&T

Garen Barnett
Manager, Information Technology
Sundown M Ranch

Scott Benson
Director, Cybersecurity and Infrastructure
Mud Bay

Shannon Boldt
Manager, Information Systems
Point No Point Treaty Council

Jeff Brausieck
Sr Manager, Chief Information Security Officer
Seattle City Light

Di Brown
Director, Agency Technology
Puget Sound Educational Service District

Shawn Cook
Director, Technology
Prosser School District

Tim Crawford
Executive Director, IT Services
Federal Way Public Schools

Alex Di Giacomo
Sr Information Security & ORCA CISO
Sound Transit

John Forrister
Director, Networking & Information Security
Tgen

Sean Godfrey
Vice President, Information Technology
Chateau Retirement Communities LLC

Ren Guardiano
Sr Director, IT Services
Seattle Children’s Hospital

Brandon Hampshire
Manager, IT Desktop and Application
Hillis Clark Martin & Peterson

Dean Haverstraw
Director, Information Technology
Samson Inc.

Julia Jackson
Director, Technology & Privacy Audit
T-Mobile

Bob Johnson
Director, Information Services
Turner Construction Group

Lawrence Kane
Sr Director, IT Procurement
Veterans Administration

Randall Kintner
Manager, DevSecOps
Transamerica

Daniel Lungu
Sr Manager, Network Infrastructure
Regal Logistics

Lupe Mejia
Technology Administrator
Yakima County, WA

Brian Moore
Director, Information Technology
Tacoma-Pierce County Health Dept

Ward Naf
Director, Information Technology
Whatcom Community College

Tony North
Sr Manager, IT Services
King County, WA

William Otworth
Sr Manager, Vulnerability, Risk Assessment
BECU

Pete Perez
Manager, Cybersecurity
Muckleshoot Casino

Jim Rawley
Network System Operations Lead
City of Bellevue, WA

Ashley Riggs
Assistant Director Innovation & Technology
City of Auburn, WA

Lionel Roberts
Manager, Information Technology
Cedar Grove

Vinay Sayala
Chief Information Officer
Sea Mar Community Health Centers

Michael Secright
Chief Information Officer
HFS University of Washington

Skylar Shaw
Director, Information Technology
Zetec

Tony Sheehan
Director, Information Services
Seattle Convention Center

Tim Stern
Principal Enterprise Architect, Security
CARIAD Inc.

Harald Upegui
Director, Information Security
HealthPoint

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

BlackPoint IT

BlackPoint IT

BlackPoint IT
Established in 1977, BlackPoint IT Services is a leading provider of comprehensive IT and Telecom Managed Services, catering to small and medium-sized businesses across the United States. Our commitment to excellence extends globally, with remote services offered internationally for our clients. Our diverse service offerings encompass Carrier, IT Networking, Telecom professional services, and project management, ensuring that our clients receive end-to-end support for their technology needs. At BlackPoint, we are dedicated to delivering tailored solutions that harness the power of current technologies, empowering our clients to achieve their business objectives both today and in the future. With a strong focus on innovation and customer satisfaction, we take pride in our ability to offer a wide range of services while maintaining a high level of expertise. Our team's collaborative approach and unwavering dedication to excellence make BlackPoint the ideal partner for businesses seeking cutting-edge IT and Telecom solutions.
Visit Website
Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
Arista Networks

Arista Networks

Arista Networks
Arista Networks is an industry leader in data-driven, client-to-cloud networking for large data center, campus, and routing environments. Arista’s award-winning platforms deliver availability, agility, automation, analytics, and security through an advanced network operating stack.
Visit Website
BlackBerry

BlackBerry

BlackBerry
BlackBerry Cybersecurity is a leader in endpoint security, endpoint management, encryption, and embedded systems, protecting enterprises and governments around the world. Our end-to-end approach is deeply rooted in Cylance® AI and machine learning, providing continuous preventative protection, detection, and instant response. We extend protection for your organization against current and future cyberthreats by combining network and endpoint telemetry and by delivering innovative solutions in the areas of cybersecurity, safety, and data privacy.
Visit Website
Cerium Networks

Cerium Networks

Cerium Networks
Cerium is a recognized innovator and leading provider of a full suite of collaboration, contact center, networking, data center, and security solutions. We help medium to large businesses in the Northwest plan for and then realize the positive impact of technology on their business operations, strategies, and user experiences.
Visit Website
Cohesity

Cohesity

Cohesity
Cohesity delivers a web-scale platform that simplifies data protection, consolidates file and object services, provides instant access to test/dev copies, spans from the edge to the cloud, and performs in-place searches and analytics.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
iT1 Source

iT1 Source

iT1 Source
Since 2003, iT1 Source has provided a wide range of IT solutions –– from big data and communications to online support and virtualization.
Visit Website
Macrium Software

Macrium Software

Macrium Software
Complete data security is more important than ever. Whether you’re protecting your home or business PCs, Macrium has a range of reliable solutions for you.
Visit Website
Netskope

Netskope

Netskope
Netskope, a global SASE leader, helps organizations apply zero trust principles and AI/ML innovations to protect data and defend against cyber threats. The Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Learn how Netskope helps customers be ready for anything on their SASE journey, visit netskope.com.
Visit Website
Quest Software

Quest Software

Quest Software
At Quest, we solve complex problems with simple solutions. Our philosophy is focused on great products, great service and being simple to do business with. We deliver technology that eliminates the need to choose between efficiency and effectiveness.
Visit Website
Red Siege

Red Siege

Red Siege
Red Siege is one of the most trusted information security consulting firms in the industry that concentrates on the latest threats to organizations today. Red Siege performs in-depth analysis, determine organization/business risk, and finds the vulnerabilities before the bad guys do. The Red Siege team of trained, qualified, and experienced information security experts is led by one of the most recognized names in the industry, our CEO Tim Medin.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website
Univision Computers

Univision Computers

Univision Computers
Univision Computers has been serving the Northwest US area since 1989, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. It's always been our goal to provide enterprise-level IT practices and solutions to the small business sector, with small business prices.
Visit Website

BRONZE SPONSORS

APC by Schneider Electric

APC by Schneider Electric

APC by Schneider Electric
APC, a flagship brand of Schneider Electric, provides clean battery backup power, surge protection and IT physical infrastructure inside and outside the traditional IT environment. Through APC brand products and solutions, they offer certainty in a connected world. Certainty that their reliable, integrated physical infrastructure solutions are based on the fundamental premise that your data and information should —and always will be —accessible.
Visit Website
Axonius

Axonius

Axonius
Axonius is an asset inventory management platform that focuses on cybersecurity solutions and policies.
Visit Website
baramundi

baramundi

baramundi
baramundi Software offers efficient, secure, and cross-platform management of workstation environments. With over 20 years of UEM experience across the globe, over 4,000 customers benefit from our intuitive, single-interface platform.
Visit Website
CompuNet

CompuNet

CompuNet
CompuNet is a leading U.S. information technology partner, headquartered in Boise, Idaho. The firm specializes in consultation, design and implementation services specifically tailored to solve business problems. With a best-in-class engineering staff and approach, CompuNet focuses on building lasting relationships that prioritize client satisfaction over sales through every step of the journey.
Visit Website
Critical Start

Critical Start

Critical Start
Critical Start Managed Cyber Risk Reduction solutions ensure continuous security monitoring and mitigation, delivering robust protection against threats. With our platform’s maturity assessments, event analytics, response capabilities, and a team of expert risk mitigators, achieve the highest level of cyber risk reduction and increase confidence in attaining desired security maturity.
Visit Website
CrowdStrike

CrowdStrike

CrowdStrike
CrowdStrike® provides cloud-delivered endpoint and workload protection. Leveraging artificial intelligence (AI), the CrowdStrike Falcon® platform protects customers against cyberattacks on endpoints and workloads on or off the network by offering visibility and protection across the enterprise.
Visit Website
Digital Realty

Digital Realty

Digital Realty
At Digital Realty, our purpose is to bring companies and data together, in bold new ways, to power the innovation determining our future. Across PlatformDIGITAL®, we provide that meeting place on a global platform supporting our customers’ critical IT architecture requirements.
Visit Website
Entrust

Entrust

Entrust
Entrust’s identity and data security solutions enable the Zero Trust maturity journey needed to help protect your organization, and we deliver convenient, secure digital interactions for your customers and citizens.
Visit Website
eSentire

eSentire

eSentire
eSentire’s complete, multi-signal Managed Detection and Response services provide 24/7 cutting-edge protection to prevent cybercriminals from ever disrupting your business.
Visit Website
Extreme Networks

Extreme Networks

Extreme Networks
Extreme Networks, Inc. (EXTR) delivers software-driven networking solutions that help IT departments everywhere deliver the ultimate business outcome: stronger connections with customers, partners and employees.
Visit Website
GCSIT

GCSIT

GCSIT
GCSIT is a different kind of engineering firm. We act as your personal technology optimization team to create and maintain custom-built, agile infrastructure. We help you transition to the right technology solutions to better handle complex and dynamic challenges.
Visit Website
Illumio

Illumio

Illumio
Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes how workloads and devices are communicating, creates granular segmentation policies which only allow necessary communication, and automatically isolates ransomware and breaches. Assume breach. Minimize impact. Increase resilience.
Visit Website
Technology Source

Technology Source

Technology Source
With access to over 500 service providers, Technology Source works alongside IT departments to create best-in-breed solutions that include Managed IT Services—including Cybersecurity, Telecom Services and Mobility Services. Our primary objective is to reduce operational expenses, improve efficiencies and deliver an outstanding customer experience for our client partners.
Visit Website
ValorC3

ValorC3

ValorC3
ValorC3 is a modern data center, cloud and connectivity partner that delivers agile, scalable IT solutions tailored to the relentless mid-market enterprise. Valor meets clients where they’re at and gets them where they need to grow, helping them navigate the rapidly changing digital landscape with flexible, high-density data centers, extensive infrastructure expansion capabilities, low latency networks, strong partnerships and decades of industry expertise.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website
VLCM

VLCM

VLCM
VLCM has been in business for over thirty years, and in that time, we’ve helped thousands of customers throughout the Rocky Mountain West find the proper solutions for their IT needs.
Visit Website

EXHIBITORS & ASSOCIATIONS

Adlumin

Adlumin

Adlumin
Adlumin's security and compliance automation platform helps organizations manage evolving threats and cybersecurity compliance requirements.
Visit Website
AFCEA Seattle

AFCEA Seattle

AFCEA Seattle
AFCEA is an international organization that provides a forum for the ethical exchange of information. AFCEA is dedicated to increasing knowledge of issues relevantto its members in information technology, communication, homeland security and more.
Visit Website
Axelliant

Axelliant

Axelliant
Axelliant design, deploy, implement, and manage advanced IT solutions and services with agility and responsiveness through the entire solution delivery process. Axelliant is there to guide customers on their personalized journey to success.
Visit Website
Barracuda

Barracuda

Barracuda
Barracuda Networks is the worldwide leader in Security, Application Delivery and Data Protection Solutions. More than 200,000 global customers trust Barracuda to safeguard their employees, data, and applications from a wide range of threats. Barracuda provides easy, comprehensive and affordable solutions for email protection, application protection, network protection and data protection. We are continually innovating to deliver tomorrow’s security technology, today.
Visit Website
Bitdefender

Bitdefender

Bitdefender
Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide. Guardian over millions of consumer, business, and government environments, we are the industry’s trusted expert for eliminating threats, protecting privacy and data, and enabling cyber resiliency.
Visit Website
Brother

Brother

Brother
Brother products have been changing the way people work for years. Our reliable, high-quality, feature-rich printers, fax machines, mobile solutions, and more are hard at work in businesses everywhere. Brother products also offer unique and innovative solutions for industrial, manufacturing, machine tool, and commercial sewing and embroidery. Whatever your need, Brother products are At your side.
Visit Website
Chatsworth

Chatsworth

Chatsworth
Chatsworth Products (CPI) addresses today’s critical technology equipment needs with products and services that protect your ever-growing investment in information and communication technology and industrial enclosure markets. We act as your business partner and are uniquely prepared to respond to your specific requirements with global availability and rapid product customization that will give you a competitive advantage.
Visit Website
CISA

CISA

CISA
CISA is the Nation’s risk advisor, working with partners to defend against today’s threats and collaborating to build more secure and resilient infrastructure for the future.
Visit Website
CommScope

CommScope

CommScope
Advancing broadband enterprise and wireless networks to power progress and create lasting connections.
Visit Website
Commvault

Commvault

Commvault
Commvault is a worldwide leader in delivering data readiness. Commvault's backup and recovery software enables you to protect, manage, and use your data, while managing it in a consistent, compliant way.
Visit Website
Cradlepoint

Cradlepoint

Cradlepoint
Cradlepoint enables the freedom to connect people, places, and things that drive more experiences, more ways to work, and better business results — anywhere. The company is a pioneer in Wireless WAN, offering advanced 4G and 5G routers and adapters — controlled through Cradlepoint NetCloudTM. Organizations rely on Cradlepoint and its Cellular Intelligence to build a reliable, secure network for fixed and temporary sites, vehicles, IoT devices, and remote employees. Headquartered in Boise, Idaho, Cradlepoint is a subsidiary of Ericsson’s Business Area Enterprise Wireless Solutions division. It has international offices in Asia Pacific, Canada, Europe, India, and Latin America.
Visit Website
CSA Seattle

CSA Seattle

CSA Seattle
The Cloud Security Alliance (CSA) is a non-profit with a mission to promote best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing.
Visit Website
DAMA Puget Sound

DAMA Puget Sound

DAMA Puget Sound
Data Management Association - Puget Sound is a non-profit professional organization whose objective is to promote and advance the concepts of information resource management in the Pacific Northwest.
Visit Website
ESET

ESET

ESET
For more than 30 years, ESET® has been developing industry-leading IT security software and services to protect businesses, critical infrastructure, and consumers worldwide.
Visit Website
Evergreen Technologies

Evergreen Technologies

Evergreen Technologies
We enable businesses to operate efficiently while keeping pace with growth and technology through our personal approach and quality of service. Our team of seasoned Project Managers oversee all aspects of a project, from quote to design as well as ordering parts and implementation. This allows our Project Managers to establish a personal relationship with our clients and offer a single point of contact.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet helps organizations across the public and private sectors protect the systems, data, and services that keep businesses and communities running. From government agencies and schools to enterprises and service providers, leaders rely on Fortinet to secure critical infrastructure, ensure operational continuity, and defend against evolving cyber threats. Our Security Fabric platform unifies networking and security to deliver the visibility, control, and efficiency organizations need to operate confidently, whether virtual, in the cloud, or on-premises.
Visit Website
FusionTek

FusionTek

FusionTek
FusionTek is a managed service provider specializing in providing reliable IT services design for our clients demanding IT needs. In addition to managed services, we specialize insecurity and unified communication projects.
Visit Website
HDI Seattle

HDI Seattle

HDI Seattle
HDI is the world’s largest IT service & technical support membership association and the industry’s premier certification and training body. Guided by an international panel of industry experts and practitioners.
Visit Website
Heimdal Security

Heimdal Security

Heimdal Security
Empower your security and IT teams with Heimdal’s unified platform, built to defend against next-gen threats and provide comprehensive protection across multiple fronts. From endpoints and networks to emails, identities, and beyond, Heimdal has you covered with advanced detection and response capabilities.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
HPE Juniper Networking

HPE Juniper Networking

HPE Juniper Networking
Juniper Networks is now part of HPE. Together, we're building industry-leading, secure, AI-native networks – purpose-built with and for AI. As AI and networking converge, we're driving a bold transformation across enterprises, service providers, and cloud operators.
Visit Website
IGEL Technology

IGEL Technology

IGEL Technology
IGEL provides next-gen edge OS endpoint security, optimization, and control solutions for cloud workspaces and virtual desktops.
Visit Website
InfraGard Washington

InfraGard Washington

InfraGard Washington
InfraGard is a partnership between the FBI and the private sector representing businesses, academia, state , local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the U.S.
Visit Website
ISC2 Seattle

ISC2 Seattle

ISC2 Seattle
Bringing like-minded professionals together in the Greater Puget Sound region to discuss current tactics, techniques, and procedures within cybersecurity.
Visit Website
ISSA Puget Sound

ISSA Puget Sound

ISSA Puget Sound
The Information Systems Security Association (ISSA) is a not-for profit international organization of information security professionals and practitioners.
Visit Website
MSPAA

MSPAA

MSPAA
The MSP Association of America (MSPAA) has been established with three primary missions, each of which follows a unique trajectory aimed at providing our clients, members, and students with a collaborative and informative pathway towards building a future for technology, business, and education.
Visit Website
NETSCOUT

NETSCOUT

NETSCOUT
The complexity of our connected world is soaring at rates never before seen, creating problems nearly impossible to find. As Guardians of the Connected World, it is our collective mission to secure and assure the performance of our digital ecosystems - across any application, any cloud, any data center. Our patented Smart Data technology and continuous monitoring was engineered to penetrate the countless layers of services, applications, and hybrid cloud servers that comprise your digital architectures. Identify problems with precision and solve them with confidence.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website
Puget Sound PMI

Puget Sound PMI

Puget Sound PMI
The Puget Sound Chapter of the Project Management Institute is part of an international nonprofit professional organization dedicated to advancing project management excellence through professionalism.
Visit Website
Rain Networks

Rain Networks

Rain Networks
Rain Networks is a Value-Added-Distributor located near Seattle, Washington. The company was founded in 2003 with the vision of bringing the world's best technology products to the people that need them to make their business run more efficiently.
Visit Website
Secure Smart Office

Secure Smart Office

Secure Smart Office
Secure, Smart Office is a San Diego-based Secured IT company with decades of combined experience in security & IT focused on protecting small and mid-size organizations of our community. We are a proud provider of ESET, industry-leading IT security products from endpoint and mobile security, encryption, two-factor authentication to cybersecurity awareness training.
Visit Website
SIM Seattle

SIM Seattle

SIM Seattle
SIM inspires the minds of the most prestigious IT leaders. Highly regarded as the premier network for IT leadership, SIM is a community of thought leaders who share experiences and rich intellectual capital, and who explore future IT direction.
Visit Website
Thales

Thales

Thales
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks.
Visit Website
VAST Data

VAST Data

VAST Data
VAST Data delivers the data platform at the heart of the AI-powered world, accelerating time-to-insight for workload-intensive applications. The VAST data platform delivers scalable performance, radically simple data management and enhanced productivity. Launched in 2019, VAST is the fastest-selling data infrastructure startup in history.
Visit Website
Verkada

Verkada

Verkada
Verkada provides cloud-managed security solutions—video surveillance, access control, alarms, and more—designed to simplify physical security and deliver real-time insights for safer, smarter buildings.
Visit Website
WatchGuard

WatchGuard

WatchGuard
For 25 years, WatchGuard Technologies has pioneered easy-to-deploy and easy to manage solutions. With industry-leading network security, secure Wi-Fi, MFA, Endpoint and network intelligence products and services for more than 250,000 companies. In a world where the cybersecurity landscape is constantly evolving, and new threats emerge each day, WatchGuard makes enterprise-grade cybersecurity technology accessible for every company.
Visit Website
WiCyS Western Washington

WiCyS Western Washington

WiCyS Western Washington
Women in CyberSecurity is the premier organization with international reach dedicated to bringing together women in cybersecurity from academia, research and industry to share knowledge, experience, networking and mentoring.
Visit Website
WorkSafe Technologies

WorkSafe Technologies

WorkSafe Technologies
WorkSafe Technologies is a leading authority in seismic protection. WorkSafe Technologies' ISO-Base seismic isolation technology is the most effective way to protect mission-critical and expensive electronic equipment in the event of an earthquake.
Visit Website
Wowrack

Wowrack

Wowrack
Wowrack is a global cloud service provider; offering various Hosting services including Managed Hosting Solutions, Dedicated Server Solutions, Colocation, Virtualization, Disaster Recovery, Backup services and much more!
Visit Website
Xiologix

Xiologix

Xiologix
Xiologix is a technology solution provider of business driven multi-vendor IT solutions to customers throughout the US and Canada. They offer a wide variety of hardware and software products from the world's leading IT companies.
Visit Website

Interested in becoming part of our next Seattle event?

CONTACT US FOR INFO

Seattle

Seattle Convention Center
Ballroom 6BC
705 Pike Street
Seattle, WA 98101

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.