F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Salt Lake City 2019 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

October 1st, 2019
8:30am – 4:30pm

Salt Palace Convention Center
Room 255
100 SW Temple
Salt Lake City, UT 84101

Directions & Parking

KEYNOTE: See More, Do More

  Presented by Blaine Carter • Chief Information Security Officer, Franklin Covey

Seminar Schedule

VIEW FLOORPLAN
  • Theater One
  • Theater Two
  • Theater Three
  • AM Sessions
  • PM Sessions
  • Keynote
9:00 - 9:50 AM

Threats to Public Cloud Workloads

  Presented by Trend Micro

This presentation will revolve around the various threats workloads are susceptible to as more and more organizations shift from on-premise to the cloud. This will focus primarily on public cloud infrastructure but many of the concepts will apply directly to private cloud/on-prem data center infrastructure as well. The goal of the talk is to give the audience a better understanding of the vulnerabilities associated with cloud workloads and mitigation strategies.

Topics: Information Security
10:00 - 10:50 AM

Cyber Security in 2019

  Presented by Fortinet

In today's quickly evolving technical landscape, defending networks from known and unknown threats is more critical than ever before. Join speaker Cory Sober, Systems Engineering Manager from Fortinet as he discusses how to concentrate the value of your security-related investments towards leveraging cyber security solutions as key business enablers that deliver highly reliable, fast and secure services to end-users no matter their locale, device type or level of security awareness.

Topics: Information Security
11:00 - 11:50 AM

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today's businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Topics: Information Security
12:00 - 12:45 PM

Panel Discussion by INTERFACE Advisory Council

  Moderated by INTERFACE Advisory Council

The details of this presentation will be available soon. Please check back for updates!

1:00 - 1:50 PM

Innovation and Evolution: BC/DR for Today’s Multi-Cloud Environments

  Presented by Unitrends

We are living in a "Less is More" world. In a landscape that's rapidly changing, IT professionals are managing more work, projects, and risk than ever before. While external threats such as malware and natural disasters cause significant downtime and data loss without proper BCDR implementation, organizations must also be prepared to safeguard from within. Data continues to grow at an exponential rate, and not only on-premises. As cloud-delivered solutions such as IaaS and SaaS are rapidly adopted by an increasing number of organizations, and the workforce itself is becoming increasingly dispersed and mobile, organizations must consider data protection strategies to address gaps in BC/DR outside the traditional data center. Join Adam Marget, Technical Specialist from Unitrends, as we explore the evolving landscape of data protection, cloud’s growing role, BC/DR strategies to safeguard local, remote, and cloud-based workloads, and best practices in planning your DR approach.

Topics: Business Continuity / Disaster Recovery
2:00 - 2:50 PM

Remote Working: How to Control the Uncontrollable

  Moderated by INTERFACE Advisory Council

Panelists:

  • Nyle Stoddard, Manager • Information Technology, RR Donnelley
  • Danny Yeo • IT Director, College of Life Sciences, BYU
  • James Duckett • Manager, Technology, City of St. George
Blaine CarterBlaine CarterChief Information Security Officer, Franklin Covey
3:00 - 3:50 PM

See More, Do More

  Presented by Blaine Carter • Chief Information Security Officer, Franklin Covey

I often go into situations with certain assumptions, chief of which is that how I see a situation is the way the situation is seen by everyone. This includes interactions with others as well as projects or technologies. From cultural differences to technology experiences, how we see the world is shaped by our own history. I will expand on how to ensure we are looking at situations with a lens that sees more and from other perspectives. I will also give practical advice on ways we can expand our sight as well as expand our influence with others.

Blaine is an IT professional with 20 years of enterprise experience in development, infrastructure, management, and security. He currently works as the Chief Information Security Officer and Data Protection Officer at Franklin Covey where he's developed a global security and privacy strategy in order to be compliant in an ever-changing security and privacy landscape. He has presented on security and identity access programs internationally. Blaine has also led the development efforts for multiple SAAS solutions that have helped millions of users develop better success in leadership, time management, and interpersonal relationships. Another solution tracks the NPS of multiple Fortune 500 companies and helped improve brand loyalty.

  • AM Sessions
  • PM Sessions
9:00 - 9:50 AM

The Current Malware Threat Landscape & Enterprise Grade Remediation

  Presented by Malwarebytes

Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.

This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.

Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.

Topics: Information Security
10:00 - 10:50 AM

Innovation and Evolution: BC/DR for Today’s Multi-Cloud Environments

  Presented by Unitrends

We are living in a "Less is More" world. In a landscape that's rapidly changing, IT professionals are managing more work, projects, and risk than ever before. While external threats such as malware and natural disasters cause significant downtime and data loss without proper BCDR implementation, organizations must also be prepared to safeguard from within. Data continues to grow at an exponential rate, and not only on-premises. As cloud-delivered solutions such as IaaS and SaaS are rapidly adopted by an increasing number of organizations, and the workforce itself is becoming increasingly dispersed and mobile, organizations must consider data protection strategies to address gaps in BC/DR outside the traditional data center. Join Adam Marget, Technical Specialist from Unitrends, as we explore the evolving landscape of data protection, cloud’s growing role, BC/DR strategies to safeguard local, remote, and cloud-based workloads, and best practices in planning your DR approach.

Topics: Business Continuity / Disaster Recovery
11:00 - 11:50 AM

A New Era of Data Protection: Converged DR and Backup

  Presented by Zerto

In today's always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. Being prepared for any data related disaster is key!

  • The cost and business impact of downtime and data loss can be immense
  • Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by software problems and cyber security related disasters
  • Having a plan and process in place will help you mitigate the impact of an outage on your business.

In this presentation we will address the challenges, needs, strategies, and solutions.

Topics: Business Continuity / Disaster Recovery
1:00 - 1:50 PM

Digital to Physical: Real-World Impact of Security Risks in Industries Using IIoT

  Presented by Trend Micro

This presentation will talk about research on radio remote controllers used in industrial settings, and how they can be used for attacks in this environment. This will shed light on how a cyberattack can inflict physical damage or harm. The goal is to inspire the audience to think outside the box in terms of what can be compromised and impose a sense of urgency in the IoT/IIoT security space.

Topics: Information Security
2:00 - 2:50 PM

The Top 5 Challenges for Desktop and App Virtualization

  Presented by Bitdefender

Businesses with large office or task-based workforces are increasingly moving to application and desktop virtualization. This is because virtualization technologies, both applications and virtual desktop infrastructure (VDI), offer IT organizations and their end users an array of choices in accessing applications and desktops. And, as organizations adopt digital workspaces, they naturally expect a higher-quality user experience. Unfortunately, virtualization brings both new and unique security challenges with it.

This presentation will cover the top challenges that enterprises face and will cover suggestions to identify a security solution that complements your virtualization initiatives and makes both the Infosec team and users happy.

  • AM Sessions
  • PM Sessions
9:00 - 9:50 AM

Architecting the New SD-WAN Edge for the Cloud-First Enterprise

  Presented by Silver Peak Systems

Adoption of cloud services has driven enterprises to re-think WAN architecture. Architectures based on traditional, manually-programmed routers can't keep pace. A business-driven SD-WAN can provide secure direct connections from the branch to SaaS/IaaS across the internet, significantly increasing application performance resulting in a superior end-user QoEx (Quality of Experience). By integrating SD-WAN, WAN optimization, routing and security in a single unified platform, enterprises can simplify branch WAN edge architecture, accelerating time to value and dramatically reducing operational costs. From a centralized SD-WAN orchestrator, application priorities and QoS and security policies may be configured and assigned to automate traffic handling across the WAN. A single mouse click distributes SD-WAN configuration parameters to all sites, improving operational efficiency and minimizing the potential for human errors that can negatively impact application availability and enterprise security. This session will describe why SD-WAN adoption continues at a breakneck pace because of the user productivity, agility and cost savings benefits that a business-driven SD-WAN delivers.

Topics: Information Security
10:00 - 10:50 AM

MFA is not a Four Letter Word

  Presented by JourneyTEAM

Securing identities is at the core of an intelligent cloud deployment. Learn how to plan and implement one of the most important security measures in Office 365, MFA! We will teach you tips and tricks on how to successfully deploy MFA without your users hating it and you will get the latest updates around usability for an MFA deployment.

Topics: Information Security
11:00 - 11:50 AM

Achieving Successful Security Segmentation

  Presented by Illumio

You rely on the network to deliver applications. But as IT scales in size, connectivity, and environments outside the network to public cloud, we cannot rely solely on the network to secure applications. The answer is to decouple security segmentation from the network. This allows us to protect applications wherever they run – because they do not live exclusively on our networks anymore, and enforcement must go wherever they do.

During this informative session, we'll discuss:

  • What is security segmentation?
  • Challenges of traditional network segmentation
  • Decoupling segmentation from network architecture
  • Principles of successful security segmentation
  • 5 steps to implement a strategy
Topics: Information Security
1:00 - 1:50 PM

Emerging Trends in Cybersecurity

  Presented by Trace3

As the threat landscape rapidly expands, enterprises across all industries are seeking approaches and technologies to safeguard their interest from advanced and persistent threats. Mounting regulatory and financial penalties against a talent shortage, the need for better cybersecurity only becomes more apparent.

Startups are emerging to offer solutions that address vulnerabilities arising from the growing threat vectors introduced by the expansion of the enterprise domain. Understanding trends and technologies that are driving the future of cybersecurity is critical to both individual contributors and leaders.

Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Kevin Abbott
Vice President
The Cadence Group

Jeff Brohamer
Director, Information Technology
Sera Prognostics, Inc.

Barry Brown
Associate Director: Info Tech
Utah Zoological Society and Utah’s Hogle Zoo

Cory Brown
Director, Information Systems
Consulmed

Blaine Carter
Information Security Manager
Franklin Covey

Adam Deason
IT Operations Manager 
Bear River Mutual Insurance Co

Al Delacruz
Manager, Information Technology
Cookietree Inc.

Dave Fletcher
Chief Technology Officer
UT Department of Technology Services

Robert  Frailey
IS Manager
Utah Medical Products

Toby Garcia
Director, Information Technology
Visit Salt Lake

Ruben  Garza
IT Manager
Ace Recycle & Disposal

Karl Oldroyd
Director
Selecthealth

Mike O’Rourke
Director of IT
Lighthouse Resources, INC

Carl Peterson
Chief Information Officer
Brain Trace

Vaughn Peterson
VP Information Technology
Cyprus Credit Union

Jake  Schroeder
Director of Information Security
HigherVue

Nyle Stoddard
Manager, Information Security
RR Donnelley

Ryan Taylor
Director, Information Technology
Paramount Acceptance

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Trend Micro

Trend Micro

Trend Micro
Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information.
Visit Website
Unitrends

Unitrends

Unitrends
Unitrends is trusted by IT leaders worldwide who know that in today's digital world protecting their ideas and keeping their business running is non-negotiable. The company’s Connected Continuity Platform protects virtual, physical, + cloud based systems.
Visit Website

SILVER SPONSORS

Bitdefender

Bitdefender

Bitdefender
Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide. Guardian over millions of consumer, business, and government environments, we are the industry’s trusted expert for eliminating threats, protecting privacy and data, and enabling cyber resiliency.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface & the power to take on the ever-increasing performance requirements of the borderless network – today and into the future.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
Illumio

Illumio

Illumio
Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes how workloads and devices are communicating, creates granular segmentation policies which only allow necessary communication, and automatically isolates ransomware and breaches. Assume breach. Minimize impact. Increase resilience.
Visit Website
JourneyTEAM

JourneyTEAM

JourneyTEAM
JourneyTEAM specializes in implementing business technology solutions. We focus on Microsoft Azure, Office 365, Dynamics and SharePoint. We offer support, implementation, training, and architecting services, as well as software and database integrations.
Visit Website
Malwarebytes

Malwarebytes

Malwarebytes
Malwarebytes protects workplace productivity. We secure all your endpoints so employees can connect confidently, from anywhere. We combine analytics-driven, multi-layer threat protection and industry-leading incident response to both simplify and strengthen overall cybersecurity. You and your team stay up and running, so you can remain focused on driving your business.
Visit Website
Silver Peak

Silver Peak

Silver Peak
Silver Peak, recently acquired by HPE Aruba, delivers networking software that powers a self-driving wide area network (SD_WAN) that learns and adapts to requirements of the business to ensure the highest levels of end user and application performance.
Visit Website
Trace3

Trace3

Trace3
Trace3 is a full-service systems integrator, focused on business transformation through the deployment of innovative solutions. We offer solutions across the infrastructure spectrum (compute/network/storage/virtualization/cloud/security/data intelligence) which includes hardware, software, and professional services.
Visit Website

BRONZE SPONSORS

10ZiG Technology

10ZiG Technology

10ZiG Technology
10ZiG Technology is a world-market leader in Thin & Zero Client endpoint devices for VDI. 10ZiG offers Intel and AMD based Dual and Quad Core Thin & Zero Clients for VMware, Citrix, and Microsoft environments. Free demo devices are available at 10ZiG.com.
Visit Website
ESET

ESET

ESET
For more than 30 years, ESET® has been developing industry-leading IT security software and services to protect businesses, critical infrastructure, and consumers worldwide.
Visit Website
Infoblox

Infoblox

Infoblox
Infoblox unites networking and security to deliver unmatched performance and protection. Trusted by Fortune 100 companies and emerging innovators, we provide real-time visibility and control over who and what connects to your network, so your organization runs faster and stops threats earlier.
Visit Website
Lume

Lume

Lume
Lume provides Managed Cloud, Data Center and Hybrid Infrastructure Solutions. Utilizing our global network and data center footprint, we provide solutions for companies that need help getting to the cloud or improving their existing cloud infrastructure.
Visit Website
Red8

Red8

Red8
Red8 is an IT solutions provider dedicated to solving critical technology challenges through modern infrastructure solutions. Recognized for its engineering excellence and consulting leadership, Red8 is a trusted partner to many of the nation’s largest corporations. Delivering flexible and scalable cloud, cybersecurity, devops, advanced analytics and data center solutions. Digital transformation starts here.
Visit Website
SoftwareONE

SoftwareONE

SoftwareONE
SoftwareONE, the leader in software and cloud portfolio management, helps optimize IT spend, on-prem and in the cloud. PyraCloud, coupled with Software Portfolio Management services, ensure the maximum return on our customers' total software investment.
Visit Website
ValorC3

ValorC3

ValorC3
ValorC3 is a modern data center, cloud and connectivity partner that delivers agile, scalable IT solutions tailored to the relentless mid-market enterprise. Valor meets clients where they’re at and gets them where they need to grow, helping them navigate the rapidly changing digital landscape with flexible, high-density data centers, extensive infrastructure expansion capabilities, low latency networks, strong partnerships and decades of industry expertise.
Visit Website
Western Digital

Western Digital

Western Digital
Western Digital creates environments for data to thrive, helping customers capture, preserve, access and transform an ever-increasing diversity of data.
Visit Website

EXHIBITORS & ASSOCIATIONS

ByteSpeed

ByteSpeed

ByteSpeed
ByteSpeed has been providing IT Solutions, including custom built hardware, networking solutions, and professional IT services in all 50 states in the US since 1999. https://bytespeed.com/
Visit Website
Comcast GovEd Salt Lake City

Comcast GovEd Salt Lake City

Comcast GovEd Salt Lake City
Comcast Business has the largest IP network in the nation, serving small businesses through large enterprises. Technology offerings include Internet and Ethernet connectivity, voice solutions, and SD-WAN on ActiveCore(SM). Learn more at business.comcast.com/enterprise.
Visit Website
Cymatic Security

Cymatic Security

Cymatic Security
Cymatic delivers the only user and entity behavior analytics (UEBA) platform that autonomously identifies and verifies a user’s security hygiene pre-endpoint and blocks any threats before they get past the browser. Delivered through a zero-agent snippet that installs in seconds, highly regulated organizations that provide web applications rely on Cymatic for real-time visibility into user and visitor behavior to detect risk, mitigate threats and enforce security hygiene.
Visit Website
Dell EMC

Dell EMC

Dell EMC
Dell EMC enables IT and digital business transformation through hybrid cloud and big-data solutions, built on a modern data center infrastructure that incorporates industry-leading converged infrastructure, servers, storage, and cybersecurity technologies
Visit Website
Garland Technology

Garland Technology

Garland Technology
Garland Technology has developed the industry's most reliable test access points and network packet brokers, enabling data centers to address IT challenges and gain complete network visibility. Visit garlandtechnology.com for more information.
Visit Website
ISACA Utah

ISACA Utah

ISACA Utah
The aim of the ISACA Utah Chapter is to sponsor local educational seminars and workshops, conducts regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the area.
Visit Website
NetApp

NetApp

NetApp
NetApp – Our team is data driven. You have a vision for digital transformation. We help you make it all possible.
Visit Website
Pure Storage

Pure Storage

Pure Storage
Pure Storage uncomplicates data storage, delivering a cloud experience that empowers organizations to maximize their data while reducing the complexity and expense of managing the infrastructure behind it. With certified customer satisfaction in the top 1% of B2B companies, Pure's customers are among the happiest in the world.
Visit Website
Robert Half Technology

Robert Half Technology

Robert Half Technology
Robert Half Technology is a leading provider of technology professionals on a project and full-time basis. We offer a full spectrum of technology staffing solutions to meet our customers' project, contract-to-full-time and full-time IT recruitment needs.
Visit Website
Sanity Solutions

Sanity Solutions

Sanity Solutions
Sanity Solutions, Inc. is headquartered in Denver, CO with offices in Minnesota and Utah. We focus on comprehensive IT solutions and establishing ourselves as a trusted adviser. We believe in delivering a legendary experience professionally and personally.
Visit Website
Syringa Networks

Syringa Networks

Syringa Networks
Syringa Networks is an industry-leading Managed Network Service Provider. We specialize in dedicated Internet, Voice, SD-WAN, Colocation, and Security. As a local provider, with more than 2,000 miles of fiber​, we deliver quick installs and access to live customer support, 24/7.
Visit Website
Terralogic DynaQuest

Terralogic DynaQuest

Terralogic DynaQuest
DynaQuest Technologies and Terralogic Solutions have joined together to offer you more options in IT Solutions. In addition to our IT Services and Virtualization expertise, we can now offer like end-to-end Application Solutions, DevOps, UI/UX and more!
Visit Website
Wilson Electronics

Wilson Electronics

Wilson Electronics
Wilson Electronics manufactures cellular boosters to resolve poor coverage at home, at work or in your vehicle. FCC & Carrier approved solution for all US cell phone carriers. Expanding cost effective wireless network coverage to everyone, everywhere.
Visit Website
ZPE Systems

ZPE Systems

ZPE Systems
ZPE Systems helps rethink the way networks are built and managed by providing software-defined, vendor-neutral infrastructure management and networking solutions for data center and branch networks.
Visit Website

Interested in becoming part of our next Salt Lake City event?

CONTACT US FOR INFO

Salt Lake City

Salt Palace Convention Center
Room 255
100 SW Temple
Salt Lake City, UT 84101

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.