F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Virtual Salt Lake City 2020 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

October 6th, 2020
8:30am – 3:30pm

Virtual Conference
Multi-track seminars with Q&A
1-on-1 chat and networking
Hourly prize drawings

KEYNOTE: Improving the Government Experience

  Presented by Mike Hussey • Chief Information Officer, State of Utah || + || Phil Bates • Chief Information Security Officer, State of Utah

Seminar Schedule

  • Theater One
  • Theater Two
  • Sessions
  • Keynote
9:00 - 9:50 AM

First Quarter of Containment

  Presented by Malwarebytes

All of us are living in the new Work from Home normal caused by the rapid transmission and spread of COVID-19. While people everywhere have been worried about stopping the spread of COVID, malicious threats have not only continued to propagate but they have exploded in new and interesting ways. During this presentation we will review some of the more creative ways hackers have targeted business and individuals during the age of Work from Home and some ways to protect yourself from them.

Topics: Information Security
10:00 - 10:50 AM

Cyber AI and Geopolitics: Managing Tomorrow’s Cyber Risk

  Presented by Darktrace

Against a backdrop of escalating geopolitical tensions and an ever-evolving threat landscape, the risk of cyber-attacks to governments and the private sector alike has never been higher. Join Darktrace’s Director of Strategic Threat, Marcus Fowler, and Americas CISO, JR Tietsort to discuss this new era of cyber-threat and how Cyber AI can help defenders regain the upper hand.

This speaking session will include a Q&A with our experts, and explore:

  • How nation-state attacks are changing
  • How organizations can respond to the classic balance of security and productivity
  • How organizational maturity in risk management is maintained whilst ensuring cyber defense

Topics: Information Security
11:00 - 11:50 AM

Zero Trust and the Flaming Sword of Justice

  Presented by Cisco

Security breaches pervade the headlines. What was seen as a rare instance just 5 years ago now seems to occupy the daily news cycle. A lot of these data breaches are made possible due to missteps and misconfigurations. There are many security issues introduced into website authentication mechanisms that further compound the security issues in addition to enforcing bad behavior by the end users. Security debt is a real problem for the vast majority of organizations in the world today and the attackers will utilize this to their advantage. In addition to keeping system hygiene at the front of the mind, defenders need to focus on proper network zone segmentation or, as it is a more popular term these days, zero-trust networks. The old conceptual style of a castle wall and moat to defend a network was deprecated several years ago. As a result of the dissolution of the traditional perimeter, a stronger focus has to be placed on the strength of authentication, authorization, and trust models for the users.

The antiquated notion of an information security practitioner running through the office brandishing their flaming sword of justice above their heads screaming “thou shall not pass” has at long last reached the denouement. Whether you are responsible for the security in a financial organization or one that makes teddy bears it is necessary to adapt and learn to trust, but verify."

Topics: Information Security
1:00 - 1:50 PM

Office 365 Security Best Practices: At the Office, at Home, and on the Road

  Presented by Mimecast

Cyber-hygiene has become a source of great concern of late. And while the Office 365 suite has helped communication and collaboration from multiple location points (at the office, at home, and on the road) there are still security concerns that must be mitigated. In this presentation, we will hear best practice suggestions for remaining safe while using Office 365. First, we’ll talk about security attitudes, then review CISA concerns with Office 365, and finally offer best practice suggestions and thought leadership. This presentation will be driven by J. Peter Bruzzese… cyber-security advisor and 8x awarded Microsoft MVP (Exchange/Office 365).

Topics: Information Security, Infrastructure
Mike HusseyMike HusseyChief Information Officer, State of Utah Phil Bates • Chief Information Security Officer, State of Utah
2:00 - 2:50 PM

Improving the Government Experience

  Presented by Mike Hussey • Chief Information Officer, State of Utah Phil Bates • Chief Information Security Officer, State of Utah

State Government faces many challenges when it comes to providing services to citizens. Join Michael Hussey to find out what the State of Utah is doing to stay secure, adopt innovative technologies, collaborate with public sector and private sector, adapt to the new way of working, and upskill employees. Michael will also be joined by Phil Bates, Chief Information Security Officer for the State of Utah.

Michael Hussey was appointed Chief Information Officer (CIO) for the Department of Technology Services in October 2015. As CIO, he is responsible for the administration and supervision of a dedicated IT workforce that provides innovative services to Utah agencies and residents.

The Department of Technology Services is the IT service provider for over 20 state agencies in Utah. Utah is a leader in providing innovative, secure, and cost-effective technology solutions that are convenient and empower partner agencies to better serve the residents of the state. Mike has led Utah in eGovernment to provide over 1,300 services online, modernized all mainframe applications, made developments for data center migration to cloud, and has created efficiencies through easy-to-use, accessible, and innovative government services. Mike currently serves as the Vice President of the National Association of State Chief Information Officers (NASCIO), the premier network and resource for state CIOs and leading advocate for technology policy at all levels of government.

Hussey was born in West Covina, California and moved to Utah with his family at the age of 15. He and his wife are the parents of five children. He is a loyal University of Utah sports fan. Hussey has a passion for learning and enjoys staying current on emerging technologies.

Phil Bates is the Chief Information Security Officer for the Department of Technology Services, State of Utah. He has been involved in Cyber Security for many years, as the IT Director for the Department of Public Safety Phil aided in the creation of the Utah Cyber Task Force. Phil began his career in Law Enforcement, retiring as a Lieutenant from the West Jordan Police Department. While at West Jordan, Phil directed the deployment of the first large-scale use of Commercial Mobile Data for Public Safety in the US.

Topics: Information Security, Infrastructure
  • Sessions
9:00 - 9:50 AM

Architecting for the Agentless

  Presented by Gigamon

Today's networks are swarming with IoT, OT, and virtual devices of every size and shape. As they have proliferated, and the security attack surface has likewise increased, the market has responded with a wide variety of technologies to help understand, manage, and secure just what is on your network. This is the rise of the technologies classified as "agentless" and there is a good chance you will be looking, now or in the future, at a project that comprises such technologies. While much of what is fundamentally required to enable these technologies is not new, organizations struggle with trying to implement these on an "ad hoc" basis, with little thought to future considerations or scale. This presentation will take about a more strategic approach to handling these implementations, what a visibility fabric is, and how today's organizations can architect their environments for their future needs.

Topics: Information Security, Infrastructure
10:00 - 10:50 AM

IT Interrupted: Best Practices in Disaster Recovery Planning

  Presented by Zerto

As IT application availability requirements continue to evolve, technology continues change to meet the new requirements. Join us as we discuss planning considerations for bringing your virtualized workloads into the next generation of IT resilience. You will learn about data center options to consider as part of your recovery strategy, business and technical trade-offs that will have to be made, capacity planning considerations, and testing approaches to that are possible that will optimize application up-time.

Topics: Business Continuity / Disaster Recovery
11:00 - 11:50 AM

Why Every Business Needs a Business Continuity & Disaster Recovery Strategy

  Presented by Veeam

Today’s applications and data sets are larger, more complex, distributed and interdependent than ever. While many have a disaster recovery plan in place, executing, testing and documenting these plans is often complex and cumbersome.

We'll also discuss:

  • State of BCDR today and what hinders DR planning for most companies
  • Why backup strategy is not DR strategy
  • Democratized DR of today (how tedious, manual procedures can be completely automated, and at accessible cost)
Topics: Business Continuity / Disaster Recovery
12:00 - 12:50 PM

FBI Cybercrime Overview

  Presented by Casey Harrington • Special Agent, FBI

Ever wonder what your local FBI office is doing to combat Cybercrime? Join Special Agent Casey Harrington for an overview of information you need to know about possible threats. He will share resources that are available to you.

Special Agent Casey Harrington is the current supervisor of the FBI Cyber Task Force in Salt Lake City, Utah. Prior to his arrival in Utah in 2020, SSA Harrington spent 14 years working on the Cyber squads in the New Haven and Boston Field Offices, as a supervisor at the FBI Cyber Division Headquarters in Washington D.C, and as an Assistant Legal Attaché in Frankfurt, Germany.

Speaker: Casey Harrington • Special Agent, Federal Bureau of Investigation

Topics: Information Security
1:00 - 1:50 PM

It Ain’t Done ‘Til It’s Automated: Security at the Speed of DevOps

  Presented by Check Point

Companies are rapidly migrating applications and workloads to the cloud. For many this is a Software as a Service for a first option, with migration to public cloud second, and only if necessary will workloads be deployed inside of the legacy data center. This is further complicated by the desire to accelerate the development lifecycle allowing devops to drive the IT migration. InfoSec is playing catchup to the business and devops constant acceleration.

In this session, you will learn strategies and best practices for allowing SecOps to keep up with the Speed of DevOps, as well as fundamental security knowledge applicable for any workload migration to any cloud provider.

Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Sam Blake
Sr Risk Officer
Zions Bancorporation

Barry Brown
Associate Director, Information Technology
Utah Zoological Society and Utah’s Hogle Zoo

Blaine Carter
Manager, Information Security
Franklin Covey

Blayne Christensen
Manager, Information Technology
Weber School District

David Clark
Chief Information Officer
Utah State Bar

John Coker
Manager, Information Systems
Central Utah Water Conservancy District

Milada Copeland

Randall Crowther
Manager, Information Technology
Cache County, UT

James Duckett
Manager, Technology Division
City of St. George

Scott Foster
Assistant Vice President, Network and Security Manager
Merrick Bank

Robert Frailey
Manager, Information Systems
Utah Medical Products

Neal Francom
Manager, Security, Compliance & Audit
OODA Health

Ruben Garza
Manager, Information Technology
Ace Recycle & Disposal

John Gleave
Director, Information Technology
Springville City

Matt Huff
Chief Information Officer
Tanner LLC

Casey Johnson
Director, Technology
Rich School District

Jason Martinez
Director, Information Technology
Webb Integration

Corona Ngatuvai
Manager, Information Technology
State of Utah

Karl Oldroyd
Director
Selecthealth

Vaughn Peterson
Vice President, Information Technology
Cyprus Credit Union

Bobette Phillips
Manager, Information Security
Utah State Tax Commission

Brad Porter
Director, Information Technology
Union Pacific Railroad Employees Health Systems

Scott Rushforth
Vice President, Information Technology
Horizon Credit Union

Jake Schroeder
Director, Information Security
HigherVue

Fred Shepherd
Vice President, Information Technology
Avalon Health Care

Nyle Stoddard
Manager, Information Security
RR Donnelley

George Sturua
Manager, Corporate IT
Kuhl Clothing Company

Ryan Taylor
Director, Information Technology
Paramount Acceptance

Tyler Tholen
Manager, Risk Management
Honeywell

Greg Wood
Manager, Information Technology
Producers Livestock Marketing Association

Danny Yeo
IT Director & Systems Administrator
Brigham Young University

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

SILVER SPONSORS

Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
Gigamon

Gigamon

Gigamon
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
Malwarebytes

Malwarebytes

Malwarebytes
Malwarebytes protects workplace productivity. We secure all your endpoints so employees can connect confidently, from anywhere. We combine analytics-driven, multi-layer threat protection and industry-leading incident response to both simplify and strengthen overall cybersecurity. You and your team stay up and running, so you can remain focused on driving your business.
Visit Website
Mimecast

Mimecast

Mimecast
Mimecast is a cybersecurity provider that helps thousands of organizations worldwide make email safer, restore trust and bolster cyber resilience.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website

BRONZE SPONSORS

Cisco

Cisco

Cisco
Cisco is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. Cisco delivers intelligent cybersecurity for the real world.
Visit Website
ESET

ESET

ESET
For more than 30 years, ESET® has been developing industry-leading IT security software and services to protect businesses, critical infrastructure, and consumers worldwide.
Visit Website
ValorC3

ValorC3

ValorC3
ValorC3 is a modern data center, cloud and connectivity partner that delivers agile, scalable IT solutions tailored to the relentless mid-market enterprise. Valor meets clients where they’re at and gets them where they need to grow, helping them navigate the rapidly changing digital landscape with flexible, high-density data centers, extensive infrastructure expansion capabilities, low latency networks, strong partnerships and decades of industry expertise.
Visit Website

EXHIBITORS & ASSOCIATIONS

Interested in becoming part of our next Salt Lake City event?

CONTACT US FOR INFO

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.