F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Thank you to everyone who attended

INTERFACE Seattle 2025

The Emerald City's Premier Technology Event will return in 2026

INTERFACE Seattle 2025

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Seattle EVENTS

AT A GLANCE

December 11th, 2025
8:30am – 4:30pm

Seattle Convention Center
Ballroom 6BC
705 Pike Street
Seattle, WA 98101

Directions & Parking

Venue Accessibility

KEYNOTE: [1 CPE] Leadership in the Age of AI

  Presented by Randi Levin • Chief Information Officer, Sound Transit

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Theater Three
  • Theater Four
  • Roundtables
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Cybersecurity: Emerging Threats & Defenses

  Presented by Jim Ambrosini, Director of Advisory Services • CompassMSP

In this session, cybersecurity expert Jim Ambrosini will cover critical topics, including the evolving nature of cybersecurity threats, emerging defenses against these threats, and the role of senior management in enhancing cybersecurity. You will learn about recent high-profile breaches, the factors contributing to increased risks, and practical strategies for identifying vulnerabilities and responding to incidents effectively. This session will delve into the implications of artificial intelligence on cybersecurity, threats such as ransomware and deepfakes, and the importance of robust cybersecurity governance. Case studies will provide real-world insight into breach responses, highlighting effective measures and mistakes made while emphasizing the need for continuous monitoring and proactive risk management.

Topics: Artificial Intelligence, Information Security
10:00 - 10:50 AM

[1 CPE] Go Hack Yourself: War Stories from over 170,000 Pentests

  Presented by Tony Taylor, Sr Solutions Architect • Horizon3.ai

Join Tony Taylor, Senior Solutions Architect, for an engaging session on “Offense-Driven Defense.” Raakish will challenge conventional risk assessment practices and unveil how focusing on real-world exploitability and impact can revolutionize your security approach. Drawing from insights gathered across more than 170,000 autonomous pentests, he’ll share compelling stories and actionable lessons that show how viewing your cyber terrain through an attacker’s lens can uncover hidden vulnerabilities, optimize resource allocation, and strengthen your defenses against advanced threats. Don’t miss this opportunity to learn from a leading industry practitioner on why it’s time to “go hack yourself” and build resilience in today’s borderless threat environment.

Topics: Information Security, Infrastructure, Strategic Management
11:00 - 11:50 AM

[1 CPE] Bridging Zero Trust and SASE: A Unified Approach to Modern Cybersecurity

  Presented by Fortinet

This will be a panel discussion on how organizations can effectively bridge Zero Trust and SASE to create a unified, adaptive cybersecurity architecture that meets the demands of today’s hybrid workforce and threat landscape.

Key Takeaways:

  • Understand the core principles of Zero Trust and SASE, and how they complement each other.
  • Learn practical strategies for implementing a unified approach without adding complexity or disrupting operations.
  • Gain insights into real-world use cases and lessons learned from organizations successfully integrating these frameworks.

Moderator: Michael Lippman, Regional Channel Systems Engineer, Fortinet

Speakers:

  • Brahma Moholkar, Systems Engineer, Fortinet
  • Christian Ruediger, Account Manager, Fortinet
  • Greg Still, CEO, Xiologix
Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Identity for Today and Tomorrow

  Presented by Jim Gerken, Director of Identity Services • Novacoast

What is the minimum for an Identity Program that will meet today’s needs and continue working tomorrow? You may be part way there; you may have all the tools and use them wrong; you may have no tools, but all the right processes. We haven’t met anybody who doesn’t have problems…

Learn about the core services you need to put in place, whether process or tool, to secure your identities and, since "Identity is the New Perimeter," secure all of your resources and data. Learn what changes are coming in the Identity space so you can improve the future viability of your core Identity Services and protect those investments.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] AI Agents & Automation: How They’re Changing the Way We Work

  Presented by Hunter Helfgott, AI Solutions Consultant and Nate Purser, Account Executive • Cerium Networks

AI-powered agents are generating a lot of buzz. But what do they actually do?

In this session, you will see how organizations are starting to use AI-powered agents to solve business challenges and create new opportunities. We'll cover advanced tools like custom GPTs, Copilot Studio, and Azure AI Foundry and see how they can be leveraged to drive AI innovation and streamline workflows. This session offers a deep dive into automation's role in simplifying complex processes, enhancing customer experiences, and improving productivity.

Topics: Artificial Intelligence
Randi LevinRandi LevinChief Information Officer, Sound Transit
3:00 - 3:50 PM

[1 CPE] Leadership in the Age of AI

  Presented by Randi Levin • Chief Information Officer, Sound Transit

Join Randi Levin—veteran CIO, thought leader, and longtime champion for cultivating strong, future-ready technology teams—for an engaging look at what it means to lead in the age of AI. Drawing on decades of experience guiding complex organizations through technological transformation, Levin will highlight how AI is reshaping collaboration, talent development, and the everyday decisions that define effective leadership. She will share approachable, people-focused strategies for helping teams thrive amid rapid change, while still grounding the conversation in the realities engineers, IT managers, and executives face today. Attendees will leave with fresh perspective, practical ideas, and renewed confidence in navigating the AI-driven future.

Randi Levin is a professional speaker, author and consultant in various aspects of technology, with focuses on organization's role and programs for attracting and retaining women in technology, working with various organizations on IT strategy, implementations, and organizational assessments.

Randi has spent 30+ years in Information Technology including the CIO/CTO for the City of Los Angeles, the CIO for NASA’s Jet Propulsion Laboratory, Cast & Crew, Forest Lawn, and VP of Worldwide Corporate Systems for NBC Universal and the Walt Disney Company, as well as numerous other organizations, primarily in Southern California.

  • Sessions
9:00 - 9:50 AM

[1 CPE] Latest Data Breaches, Quantum Computing, External Key Management in the Cloud

  Presented by Steven Gautier, Principal Solutions Architect • Thales

Welcome to our session on modern data threats and protection strategies. As cyber risks evolve, securing sensitive information is more critical than ever. We'll explore how encryption and key management can help protect your most valuable assets, especially in cloud environments.

We'll highlight the benefits of external key management, offering greater control and compliance. Additionally, we'll touch on the growing impact of quantum computing—and why it's vital to start preparing now.

Join us to discover the latest advancements in data security and learn how to stay ahead of emerging threats.

Topics: Artificial Intelligence, Information Security
10:00 - 10:50 AM

[1 CPE] Achieving and Maintaining Compliance: A How to Guide

  Presented by Rob Wayt, Director, Governance, Risk, Compliance • Structured

Governance, Risk, and Compliance (GRC) frameworks are essential for organizations seeking to align business operations with regulatory expectations, mitigate risk, and demonstrate accountability. Yet, many enterprises struggle with fragmented processes, overlapping requirements, and the constant evolution of regulatory landscapes. This presentation explores the common challenges organizations face in meeting compliance obligations, including resource constraints, unclear ownership, and the difficulty of sustaining ongoing compliance rather than treating it as a one-time exercise. Attendees will gain insight into practical, repeatable steps for addressing audit findings, closing gaps, and building a culture of compliance that is both resilient and adaptable. By leveraging structured risk assessments, continuous monitoring, and cross-functional collaboration, organizations can move beyond reactive firefighting and achieve a proactive, sustainable GRC posture.

Topics: Governance, Risk, and Compliance
11:00 - 11:50 AM

[1 CPE] Don’t Panic: A Blueprint for Securing Your Data in the Age of AI

  Presented by Palo Alto Networks

It’s a fact: AI can unintentionally expose sensitive data. From customer engagement to back-office automation, intelligent systems are being deployed at such a rate that it’s not a matter of “if my data is exposed,” but “when.” In recent conversations with practitioners, it’s clear that security has shifted from an afterthought to a board-level priority. Organizations are standing up AI governance boards, drafting usage policies, and in some cases even blocking applications altogether to prevent potential data leakage.

Effective protection against AI data leakage starts with visibility. Organizations need the ability to inspect both the prompts entering an AI system and the responses coming back, so that sensitive information can be detected and stopped in real time before it leaves the enterprise. In this session, we’ll guide you through a blueprint that can help ensure your AI applications are secure, compliant, and trustworthy.

Topics: Artificial Intelligence, Information Security
1:00 - 1:50 PM

[1 CPE] Real-Time Threat Mitigation with AI-Driven SASE: A Practical Approach

  Presented by Cato Networks

In this session, we’ll explore how a converged SASE platform combined with AI and machine learning (ML) enables real-time threat detection and mitigation, transforming network security from a reactive to a proactive model. The focus will be on how AI-driven solutions within the SASE framework can identify, analyze, and neutralize security threats in real-time across distributed environments.

Topics: Information Security, Infrastructure
2:00 - 2:50 PM

[1 CPE] Beyond MFA: Architecting True Identity Resilience for the Modern Enterprise

  Presented by Rubrik

In the interconnected digital landscape, identity is the new perimeter. Yet, organizations frequently struggle to move beyond basic multi-factor authentication (MFA) and effectively solve the fundamental challenge of Identity Resilience—the ability to maintain business continuity and security even when identity systems or accounts are inevitably compromised.

This forward-looking session is tailored for CISOs and security architects ready to transition from traditional identity management to a proactive resilience model. We will dissect the modern identity threat landscape, driven by supply chain risks and large-scale PII exposure, and provide tangible frameworks for securing the enterprise.

Topics: Information Security
  • Sessions
10:00 - 10:50 AM

[1 CPE] Securing AI Without Slowing Innovation: A Blueprint for the Future of Cybersecurity

  Presented by Scarlett Menendez, Solutions Engineer • Trend Micro

AI is transforming the enterprise—bringing new opportunities for efficiency, but also introducing unprecedented risks. From prompt injection and model poisoning to shadow AI and deepfakes, the attack surface is evolving faster than most IT teams can keep up. In this session, we’ll explore Trend Micro’s Security for AI Blueprint, a step-by-step framework for protecting data, models, infrastructure, and users in an AI-driven world. You’ll also see how Trend Micro leverages AI across its own cybersecurity platform, combining decades of research with modern generative AI to deliver proactive protection. Walk away with practical strategies you can apply to safeguard your organization’s AI initiatives—without putting innovation on hold.

Topics: Artificial Intelligence, Information Security
11:00 - 11:50 AM

[1 CPE] Rethink Incident Response: From Hourly Guesswork to Guaranteed Outcomes

  Presented by John McLaughlin, Principal Sales Engineer, PNW & Gary Quinn, Sr Sales Engineer, Enterprise US • Arctic Wolf

Traditional incident response often leaves organizations reacting under pressure, navigating uncertain costs, inconsistent coverage, and slow recovery. In this session, we’ll examine strategies for making incident response more predictable and outcome-focused. Participants will explore how structured response models—emphasizing planning, rapid containment, and coordinated recovery—can reduce operational risk, minimize downtime, and support business continuity. Attendees will gain practical insights into aligning incident response practices with organizational goals, enabling IT, risk, and executive teams to make more informed decisions and improve overall cyber resilience.

Topics: Information Security
1:00 - 2:50 PM

Strategic Solutions Briefings with Sentry Computing

  Presented by Sentry Computing

The Strategic Solutions Briefings with Sentry Computing offers a dedicated space designed to give you a deeper look at how managed IT services can strengthen security, reduce risk, and improve day-to-day operations. In this non-CPE experience, Sentry’s specialists will share practical guidance, common pitfalls they help clients overcome, and strategies for building a more secure and resilient IT foundation. This is a great opportunity to ask questions and explore solutions that can make a meaningful impact.

Join Sentry Computing and leading technology partners for a rapid-fire series of briefings and a thought-provoking panel exploring the innovations shaping today’s IT landscape. This dynamic 2-hour block delivers fresh insights, practical strategies, and the chance to engage directly with industry experts.

LIGHTNING ROUND

  • 1:00–1:15 PM — Sentry Computing
    Leading IT Forward: Security, AI and Automation in 2026
    Sentry kicks off the block with an energizing look at how AI is reshaping infrastructure, security, and strategic IT planning—offering practical guidance you can apply today.
     
  • 1:15–1:30 PM — Acronis
    From Reactive to Predictive: The Next Phase of Cyber Resilience
    Get the latest insights from Acronis on safeguarding your organization against emerging threats, followed by an open Q&A for real-world answers.
     
  • 1:30–1:45 PM — Egnyte
    Unlocking Next-Gen Capabilities for Your Mission-Critical Content
    Learn how Egnyte is elevating content management and security while adding impactful AI to address industry needs.
     
  • 1:45–2:00 PM — Fortinet
    Securing the Edge: Fortinet’s Innovations You Need to Know
    Fortinet shares updates on next-gen network defense and zero-trust strategies—essential insights for staying ahead of fast-moving security demands.
     
  • 2:00–2:15 PM — Cork Cyber
    Financial Protection as a Service: Minimize Your Out-of-Pocket Loss
    An inside look at how risk intelligence and financial protection as a service can reduce financial exposure and provide a stronger safety net for modern organizations.
     

PANEL DISCUSSION

  • 2:15–2:50 PM — Partner Panel
    The Future of IT: A Candid Conversation with Industry Leaders
    Hear experts from Sentry and its partner ecosystem discuss the biggest trends shaping IT in 2025, with practical takeaways and audience-driven Q&A.
  • Sessions
9:00 - 9:50 AM

[1 CPE] The Foundation of Strong Security: Demystifying CIS Controls 1 & 2 for Enterprise Success

  Presented by Collin Covington, Sales Engineer • Axonius

Tired of the gap between security compliance and applicability? This session explores how to turn CIS Controls 1& 2, Asset Inventory and Secure Configuration, into actionable steps that strengthen your organization’s security foundation. We’ll discuss why these controls are essential for measuring and reducing risk, and how to apply them in ways that drive real outcomes rather than just checking compliance boxes. You will gain practical guidance to improve efficiency, reduce risk, and translate security requirements into meaningful results.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Insider Session: From Retired to Replaced – Preparing for Microsoft’s Wave of Changes

  Presented by iT1 Source

In this insider session, we’ll break down Microsoft’s biggest licensing and product changes so you can prepare, stay compliant, and avoid unnecessary costs. From shifting discounts to looming end-of-support deadlines, we’ll cover what every business needs to know.

Key Takeaways:

  • How Microsoft’s recent announcement will impact EA & MPSA pricing.
  • Practical steps for moving from EA to CSP with confidence.
  • Are you still running outdated technology that reached Microsoft's end of support in October?
Topics: Infrastructure, Strategic Management
11:00 - 11:50 AM

[1 CPE] Taking A Data-First Approach to Cyber Risk Management

  Presented by Austin Starowicz, Director, Solutions Consulting • Mastercard Cybersecurity

Cyber Risk Management has evolved. Every new vulnerability or regulation adds further pressures on already stretched teams to predict and manage the weakest links within your internal IT infrastructure. Piling on to today’s cyber risk landscape is the ever-expanding digital supply chain, and the need to onboard, assess, and monitor third parties, fourth parties, and Nth parties.

But does it really have to be that way?

Join this session from Mastercard Cybersecurity for an exclusive presentation on how a proactive “data-first” approach to cyber risk management can help you:

  • Improve monitoring for critical vulnerabilities to determine which ones really matter
  • Identify, Prioritize and Assess affected third parties in real-time
  • Leverage objective risk data into the decision-making processes
  • Streamline workflows and scale your operations
Topics: Information Security
12:00 - 12:50 PM

[CANCELED] AI: How to Balance Innovation with Accountability

  Presented by Andreas Bohman, VP, Information Technology; CIO • University of Washington

This session will not take place as planned, and we appreciate your flexibility. Please enjoy one of our Advisor-led Roundtables.

AI is advancing faster than most governance models can keep up. Large organizations face a growing gap between innovation and control, between those who adopt responsibly and those who fall behind. Drawing on lessons from leading AI at the University of Washington, this session explores how to balance innovation with accountability by turning governance into infrastructure rather than oversight. Attendees will learn how to build trust, manage risk, and design systems that accelerate progress while maintaining transparency and control.

Topics: Artificial Intelligence
1:00 - 1:50 PM

[1 CPE] Shadow AI: Real Consequences, Real Benefits

  Presented by CompassMSP

Whether you have sanctioned it or not, your employees are using AI at work. While AI is great for boosting productivity and automating tasks, it also brings risks, including data leaks, deepfakes, and compliance challenges. In this session, we’ll connect the dots between compliance requirements and real-world practices, showing you how to navigate AI safely, reduce risk, and still move innovation forward. Walk away with a clear view of AI’s impact and simple actions you can take to reduce risk and protect your employees and data.

Topics: Artificial Intelligence
2:00 - 2:50 PM

[1 CPE] Maximizing Impact: A Guide to Scaling Red Team Operations

  Presented by Jake Gillen, Solutions Engineer • Pentera

As organizations face expanding attack surfaces, Red Teaming remains vital for uncovering true security gaps—but traditional methods can be difficult to scale. This session introduces Automated Security Validation and its role in strengthening and accelerating Red Team activities. We’ll define what Red Teaming is, outline how to plan an exercise, and walk through real examples that illustrate improved efficiency and coverage. Attendees will learn to complement manual Red Teaming by automating repetitive tasks, enabling teams to focus on high-value adversarial techniques and maximize overall impact.

Topics: Information Security
  • Presented by the INTERFACE Advisory Council
12:00 - 12:50 PM

Advisory Council Roundtables

  Presented by the INTERFACE Advisory Council

Join us during the lunch hour for Advisory Council Roundtables, an interactive opportunity to connect with council members and peers on a variety of timely industry topics. Move freely between tables, share your perspective, and gather practical insights you can take back to your organization. These conversations are informal, high-value, and designed to spark ideas and connection.

Topics & Discussion Leaders:

  • Data Protection in the Age of AI Neha Srivastava, Vice President, Cybersecurity Products, JPMorganChase
  • Ensuring Security and Compliance with 3rd Parties Rajesh Nair, Staff Technical Program Manager, LinkedIn
  • IT Staffing: Onboarding for Success Shawn Cook, Technology Director, Prosser School District
  • Get More Out of Your IT Spending Evelyn Hernandez, Director, Information Technology, US Federal Courts
  • Managing Infosec for the Small/Medium Business John Forrister, Vice President, Information Security, Tgen
  • Security Approach in Public Sector Tim Crawford, Executive Director, ITS, Federal Way Public Schools
  • Security Awareness: What Methods Work to “Secure the Human”
    • Tad Doviak, Cybersecurity Administrator, Globe Machine
    • Sean Godfrey, Vice President, Information Technology, Chateau Retirement Communities LLC
    • Taylor Jolin, Manager, IT Operations, Nisqually Red Wind Casino
    • Lawrence Kane, Sr Director, IT Procurement, Transamerica
  • Zero Trust Strategy: Challenges & Lessons Learned Shannan Elzner, Manager, IT Operations, Sound Credit Union

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

David Anderson
Manager, Technology Services Security
Everett Community College

Ivan Avilla
Director, Cyber Incident Response
GoDaddy

Shannon Boldt
Manager, Information Systems
Point No Point Treaty Council

Jeff Brausieck
Chief Information Security Officer
Seattle City Light

Bryce Carlen
Chief Information Officer
WA Dept of Revenue

Shawn Cook
Director, Technology
Prosser School District

Tim Crawford
Executive Director, IT Services
Federal Way Public Schools

Alex Di Giacomo
Chief Information Security Officer
Sound Transit

Stephen Doherty
Director, Information Services
City of Marysville, WA

Tad Doviak
Cybersecurity Administrator
Tacoma, WA

Shannan Elzner
VP, Information & Cyber Security
Sound Credit Union

John Forrister
Vice President, Information Security
TGen

Sean Godfrey
Vice President, Information Technology
Chateau Retirement Communities LLC

Dean Haverstraw
Director, Information Technology
Samson Inc.

Evelyn Hernandez
Director, Information Technology
US Federal Courts

Taylor Jolin
Manager, IT Operations
Nisqually Red Wind Casino

Lawrence Kane
Sr Director, IT Procurement
Transamerica

Daniel Lungu
Director, Information Technology
Regal Logistics

Lupe Mejia
Technology Administrator
Yakima County, WA

Brian Moore
Director, Business Technology
Tacoma-Pierce County Health Dept

Ward Naf
Director, Information Technology
Whatcom Community College

Rajesh Nair
Staff Technical Program Manager
LinkedIn

Tony North
Sr Manager, IT Services
King County, WA

Ashley Riggs
Assistant Director, Information Technology
City of Auburn, WA

Lionel Roberts
Manager, Information Technology
Cedar Grove

Michael Secright
Chief Information Officer
HFS University of Washington

Skylar Shaw
Director, Information Technology
Zetec

Tony Sheehan
Director, Information Services
Seattle Convention Center

Neha Srivastava
Vice President, Cybersecurity Products
JPMorganChase

Harald Upegui
Director, Information Security
HealthPoint

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

CompassMSP

CompassMSP

CompassMSP
In a world where tech often forgets the humans it’s built for, Compass breaks the mold. We believe your tech partner should feel less like a vendor - and more like a trusted guide. We’re relentlessly focused on making space for your something bigger, so you can solve the world’s most important problems without getting tangled in the tech that should be enabling you. This is the future of managed services and end-to-end cybersecurity. Join us.
Visit Website
Sentry Computing

Sentry Computing

Sentry Computing
Sentry Computing builds smart IT solutions that keep your day-to-day operations running smoothly. Our Managed IT services are backed by primo customer support so you never have to think too hard about technical jargon like: Cybersecurity, Cloud Solutions, or IT strategy. Size doesn’t matter. We deliver innovative, contract-free, professional IT services for every business.
Visit Website
Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
Axonius

Axonius

Axonius
Axonius is an asset inventory management platform that focuses on cybersecurity solutions and policies.
Visit Website
Cato Networks

Cato Networks

Cato Networks
Cato provides the world’s most robust single-vendor SASE platform, converging Cato SD-WAN and a cloud-native security service edge, Cato SSE 360, into a global cloud service. Cato SASE Cloud optimizes and secures application access for all users and locations everywhere.
Visit Website
Cerium Networks

Cerium Networks

Cerium Networks
Cerium is a recognized innovator and leading provider of a full suite of collaboration, contact center, networking, data center, and security solutions. We help medium to large businesses in the Northwest plan for and then realize the positive impact of technology on their business operations, strategies, and user experiences.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface & the power to take on the ever-increasing performance requirements of the borderless network – today and into the future.
Visit Website
Horizon3.ai

Horizon3.ai

Horizon3.ai
Horizon3.ai enables organizations to continuously assess the security posture of their enterprise across many attack surfaces.
Visit Website
iT1 Source

iT1 Source

iT1 Source
Since 2003, iT1 Source has provided a wide range of IT solutions –– from big data and communications to online support and virtualization.
Visit Website
Mastercard Cybersecurity

Mastercard Cybersecurity

Mastercard Cybersecurity
Through unique threat intelligence and multi-layered, cloud-based defense technologies, Mastercard Cybersecurity helps organizations and consumers address risk in real-time, enhancing resilience against today’s most sophisticated cyberattacks.
Visit Website
Novacoast

Novacoast

Novacoast
Novacoast is an international cybersecurity company specializing in IT services and software development. With a 28-year history in the industry, Novacoast has built and maintains IT security solutions for some of the world’s largest private and public organizations. Our team is comprised of hundreds of specialists with backgrounds in IT advisory, development and engineering, and managed services. Together, we’re committed to identifying unique ways to improve the productivity and security posture of our customers.
Visit Website
Pentera

Pentera

Pentera
Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers including their ransomware readiness, unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. In 2020, Pentera was chosen by Gartner as a Cool Vendor in the Security Operations and Threat Intelligence report.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website
Thales

Thales

Thales
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks.
Visit Website
Trend Micro

Trend Micro

Trend Micro
Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information.
Visit Website

BRONZE SPONSORS

Adlumin

Adlumin

Adlumin
Adlumin's security and compliance automation platform helps organizations manage evolving threats and cybersecurity compliance requirements.
Visit Website
BigID

BigID

BigID
BigID is a leader in data security, privacy, compliance, and governance: enabling organizations to proactively discover, manage, protect, and get more value from their data in a single platform for data visibility and control.
Visit Website
Cyera

Cyera

Cyera
The data security solution you've been waiting for. Cyera enables you to discover and classify data, protect it from exposure, and maintain a resilient posture.
Visit Website
eSentire

eSentire

eSentire
eSentire’s complete, multi-signal Managed Detection and Response services provide 24/7 cutting-edge protection to prevent cybercriminals from ever disrupting your business.
Visit Website
Halcyon

Halcyon

Halcyon
Halcyon formed in 2021 by a team of cybersecurity industry veterans after battling the scourge of ransomware (and advanced threats) for years, at some of the largest global security vendors. Halcyon is focused on building products and solutions for mid-market and enterprise customers.
Visit Website
HPE

HPE

HPE
At Hewlett Packard Enterprise, we aim to be the industry’s leading provider of hybrid IT, built on the secure, next-generation, software-defined infrastructure that will run customers’ data centers today, bridge them to multi-cloud environments tomorrow, and power the emerging intelligent edge that will run campus, branch and Industrial IoT applications for decades to come. All delivered through a world class services capability.
Visit Website
Neat

Neat

Neat
Neat designs simple and elegant pioneering video devices for Microsoft Teams and Zoom Rooms, helping make the meeting space experience the best it can be. Continuously pushing boundaries, Neat devices are incredibly easy to install, set up and use.
Visit Website
NetBrain

NetBrain

NetBrain
Uncover risks and achieve proactive observability with NetBrain's turnkey, intent-based network automation platform for outage-free operations.
Visit Website
Nile

Nile

Nile
Nile automates traditional network operations with AI and delivers industry’s first performance guarantee for enterprise networks.
Visit Website
Right! Systems

Right! Systems

Right! Systems
Right! Systems, Inc. is an IT management services company that provides business-driven, multi-vendor IT solutions in Network Infrastructure, Virtualization, Storage, Unified Communications, Telepresence, Security, Mobility and Professional Services.
Visit Website

EXHIBITORS & ASSOCIATIONS

8x8, Inc.

8x8, Inc.

8x8, Inc.
8×8 is transforming the future of business communications as a leading Experience Communications as a Service (XCaaS) provider. 8×8 XCaaS brings together customer and employee experience to deliver business agility. It’s the only integrated platform for contact center, voice, video, chat, and APIs that addresses today’s dynamic, critical workplace requirements. Unlike competitors, the 8×8 Experience Communications Platform enables company-wide collaboration, unified administration, shared integrations, and cross-platform AI and analytics through the industry’s only 99.999% financially back, platform-wide service level agreement (SLA). Unlike multi-vendor environments, 8×8 XCaaS provides platform-wide reliability, lowers cost, boosts employee productivity and customer engagement, and delivers intelligence through AI-powered experiences and insights.
Visit Website
Acronis

Acronis

Acronis
Acronis provides award-winning backup software and data protection solutions for consumers, businesses and MSPs. Protect your sensitive information!
Visit Website
Armis

Armis

Armis
Armis is the global leader in cyber asset security. Fortune 500 companies trust our real-time, comprehensive asset intelligence to deliver full visibility and automated enforcement across every connected asset and environment. Armis helps organizations across any industry continuously secure their entire cyber-asset attack surface.
Visit Website
Barracuda

Barracuda

Barracuda
Barracuda Networks is the worldwide leader in Security, Application Delivery and Data Protection Solutions. More than 200,000 global customers trust Barracuda to safeguard their employees, data, and applications from a wide range of threats. Barracuda provides easy, comprehensive and affordable solutions for email protection, application protection, network protection and data protection. We are continually innovating to deliver tomorrow’s security technology, today.
Visit Website
Cork Cyber

Cork Cyber

Cork Cyber
Cork Cyber gives MSPs the clarity to run more efficient operations, strengthen security, and unlock new recurring revenue with financial protection as a service.
Visit Website
CTL

CTL

CTL
For school tech leaders stretched thin, CTL is more than a vendor—we're a strategic technology partner. CTL replaces transactional vendors with a side-by-side partnership, delivering award-winning product and service solutions that streamline the entire EdTech technology lifecycle. Today, customers in more than 65 countries rely on CTL’s Chromebooks, Chromeboxes, and video collaboration tools, as well as deployment, maintenance, and IT asset disposition lifecycle services. CTL’s expertise has earned designations as a Google for Education Premier Partner, a Google Cloud Partner, and an Intel Technology Platinum Partner. In 2024, CTL was officially certified as a B Corp™ for its sustainability and social responsibility commitments. For further information on CTL solutions, visit ctl.net.
Visit Website
DAMA Puget Sound

DAMA Puget Sound

DAMA Puget Sound
Data Management Association - Puget Sound is a non-profit professional organization whose objective is to promote and advance the concepts of information resource management in the Pacific Northwest.
Visit Website
Datadobi

Datadobi

Datadobi
Discover the most powerful vendor-neutral unstructured data management platform delivering actionable insights into vast amounts of unstructured data.
Visit Website
Eaton

Eaton

Eaton
Eaton’s Wright Line business is a leading, global designer and manufacturer of modular office furniture, technical lab furniture, command consoles, data center enclosures and airflow management solutions.
Visit Website
Egnyte

Egnyte

Egnyte
22,000+ businesses trust Egnyte's secure content cloud to boost productivity, gain AI insights, and govern enterprise mission-critical content.
Visit Website
Ericsson

Ericsson

Ericsson
Ericsson’s enterprise wireless solutions enable organizations to innovate, operate, and grow anywhere — without constraints. Ericsson NetCloud, Cradlepoint routers, and Enterprise 5G solutions provide the flexibility of public and private 5G, with the zero trust security of simplified SASE.
Visit Website
HDI Seattle

HDI Seattle

HDI Seattle
HDI is the world’s largest IT service & technical support membership association and the industry’s premier certification and training body. Guided by an international panel of industry experts and practitioners.
Visit Website
Hitachi Vantara

Hitachi Vantara

Hitachi Vantara
Hitachi Vantara helps enterprises create and derive value from their data. Its solutions include best-in-class data management, IT infrastructure and analytics products, IoT solutions and Smart Spaces technologies for a broad range of industries.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
HPE Juniper Networking

HPE Juniper Networking

HPE Juniper Networking
Juniper Networks is now part of HPE. Together, we're building industry-leading, secure, AI-native networks – purpose-built with and for AI. As AI and networking converge, we're driving a bold transformation across enterprises, service providers, and cloud operators.
Visit Website
InfraGard Washington

InfraGard Washington

InfraGard Washington
InfraGard is a partnership between the FBI and the private sector representing businesses, academia, state , local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the U.S.
Visit Website
ISACA Puget Sound

ISACA Puget Sound

ISACA Puget Sound
With more than 100,000 members in more than 180 countries, ISACA (www.isaca.org) is a recognized worldwide leader in IT governance, control, security and assurance.
Visit Website
ISC2 Seattle

ISC2 Seattle

ISC2 Seattle
Bringing like-minded professionals together in the Greater Puget Sound region to discuss current tactics, techniques, and procedures within cybersecurity.
Visit Website
ISSA Puget Sound

ISSA Puget Sound

ISSA Puget Sound
The Information Systems Security Association (ISSA) is a not-for profit international organization of information security professionals and practitioners.
Visit Website
Keystrike

Keystrike

Keystrike
Keystrike turns identity from a login event into continuous proof of who is actually behind every action. We close the gap MFA, EDR, and PAM can’t—stopping attackers who hijack sessions or operate through compromised workstations. By verifying that each command comes from a real user at a trusted device, Keystrike ensures that the person who logged in is the one acting throughout the session, restoring trust in every authenticated interaction.
Visit Website
Komprise

Komprise

Komprise
Komprise is the leader in unstructured data management. Analyze, tier, migrate, unlock data value. Optimize storage costs, feed AI data workflows.
Visit Website
MSPAA

MSPAA

MSPAA
The MSP Association of America (MSPAA) has been established with three primary missions, each of which follows a unique trajectory aimed at providing our clients, members, and students with a collaborative and informative pathway towards building a future for technology, business, and education.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website
Puget Sound PMI

Puget Sound PMI

Puget Sound PMI
The Puget Sound Chapter of the Project Management Institute is part of an international nonprofit professional organization dedicated to advancing project management excellence through professionalism.
Visit Website
Qumulo

Qumulo

Qumulo
Qumulo, the leader in data-aware scale-out NAS, helps CIOs and storage administrators store, manage and curate enormous numbers of digital assets.
Visit Website
Ruckus Networks

Ruckus Networks

Ruckus Networks
Ruckus Networks is redefining connectivity around the globe. We build secure wired and wireless access networks for organizations that place a premium on connectivity experiences for end-users as well as simplicity and lower-cost-per-connection for IT.
Visit Website
TPx Communications

TPx Communications

TPx Communications
TPx is your sidekick for smart IT—helping organizations connect, secure, and grow with confidence. Leveraging decades of experience, TPx delivers managed services for cybersecurity, networks, and cloud communications that reduce risk and maximize the value of IT investments.
Visit Website
WatchGuard

WatchGuard

WatchGuard
For 25 years, WatchGuard Technologies has pioneered easy-to-deploy and easy to manage solutions. With industry-leading network security, secure Wi-Fi, MFA, Endpoint and network intelligence products and services for more than 250,000 companies. In a world where the cybersecurity landscape is constantly evolving, and new threats emerge each day, WatchGuard makes enterprise-grade cybersecurity technology accessible for every company.
Visit Website
WiCyS Western Washington

WiCyS Western Washington

WiCyS Western Washington
Women in CyberSecurity is the premier organization with international reach dedicated to bringing together women in cybersecurity from academia, research and industry to share knowledge, experience, networking and mentoring.
Visit Website
Xiologix

Xiologix

Xiologix
Xiologix is a technology solution provider of business driven multi-vendor IT solutions to customers throughout the US and Canada. They offer a wide variety of hardware and software products from the world's leading IT companies.
Visit Website

Interested in becoming part of our next Seattle event?

CONTACT US FOR INFO

Seattle

Seattle Convention Center
Ballroom 6BC
705 Pike Street
Seattle, WA 98101

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.