F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Salt Lake City 2023 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Salt Lake City EVENTS

AT A GLANCE

May 11th, 2023
8:30am – 4:30pm

Salt Palace Convention Center
Room 355
100 SW Temple
Salt Lake City, UT 84101

Directions & Parking

KEYNOTE: [1 CPE] How to Dramatically Transform Employee Satisfaction with Your IT Team

  Presented by Beau Sorensen • Chief Operating Officer, First Choice Home Health & Hospice

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Protecting Your Data from Ransomware Where it Lives: Your Last Line of Defense

  Presented by Spencer Tidwell, Hybrid Cloud Enterprise Architect • Hitachi Vantara

If an attack happens and makes it all the way to your data, then they have already broken through all your walls. Where your data lives IS your last line of defense, which is why the Armed Forces that protect the USA trust Hitachi to protect them. Prevention is great but without that last line of defense, you’re a sitting duck. Attend this session to learn how Hitachi serves as your last line of defense against ransomware attacks.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Open Source Developers Are Security’s New Front Line

  Presented by Neel Thakkar, Sales Engineer • Sonatype

Bad actors have recognized the power of open source and are now beginning to create their own attack opportunities. This new form of assault allows hackers to poison the well, where OSS project credentials are compromised, and malicious code is intentionally injected into open source libraries. In this session, Sonatype will explain how both security and developers must work together to stop this trend or risk losing the entire open source ecosystem.

  • Analyze and detail the events leading to today’s “all-out” attack on the OSS industry.
  • Define the future of open source in today’s new normal.
  • Outline how developers can step into the role of security to protect themselves and the millions of people depending on them.
Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Zero Trust Microsegmentation – It’s Easier Than You Think

  Presented by Sumi Gorla, Director of Systems Engineering • Illumio

Regardless of the sophistication of the ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you with simple steps to get started that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

Sumi Gorla is the Director of Systems Engineering at Illumio. Her responsibilities include executing Illumio strategic product vision, field engineering enablement, and enterprise customer selling and support across US West. Prior to Illumio, Sumi has held several engineering and technical sales leadership roles in companies such as EMC, Brocade, Citrix, and BigSwitch Networks. As a sales leader, Sumi brings a unique approach to problem-solving, from both a technical and a business perspective. Sumi’s strengths are in her ability to explain how technical features can meet business requirements for all levels of audience.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] The Ransomware Recovery Puzzle

  Presented by Peter Martinson, Sr Security Engineer • Sanity Solutions

We all hear about ransomware on the news but are we prepared to deal with it? Join us as we talk through real-life case studies of companies that have gone through ransomware attacks and learn how the process works.

  • Timeline of an attack
  • Recovery of Systems
  • To pay or not to pay
  • Legal concerns
  • Cyber Insurance

We will look at all the pieces of the puzzle and see if we can't form a picture.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Panel: Has Security Awareness Been Forgotten?

  Presented by INTERFACE Advisory Council

With all the challenges of the last few years, IT departments have been tasked with keeping remote workers productive, protecting data, safeguarding networks, and many other tasks. Now that companies have solidified their in-office and remote working setups, security awareness needs to be revisited.

As we frequently see, many security issues come from insider threats. Whether intentional or accidental, network users still present a major security issue. Join the INTERFACE Salt Lake City Advisory Council for a discussion to offer some of the best tips to better protect from human errors. Local IT leaders will discuss their approaches, shares success stories, and discuss what else needs to be addressed. Bring your questions for an open conversation to try and help everyone better secure their network from internal threats.

Panelists:

  • Greg Pugh, Information System Security Officer/COMSEC Engineer, Space Dynamics Laboratory
  • Paul Tew, Information Security Officer, Snow College
  • Danny Yeo, Information Technology Director, Brigham Young University Life Sciences
Topics: Information Security
Beau SorensenBeau SorensenChief Operating Officer, First Choice Home Health & Hospice
3:00 - 3:50 PM

[1 CPE] How to Dramatically Transform Employee Satisfaction with Your IT Team

  Presented by Beau Sorensen • Chief Operating Officer, First Choice Home Health & Hospice

One of the most challenging aspects of Information Technology is creating loyalty in your department. IT staff are incredibly smart and can solve almost every problem that comes at them, whether it is a broken computer, a bad connection, or software that isn’t working. Even though they are great at solving problems, IT is often looked at as the department of last resort because people don’t leave a discussion with IT feeling great about the solution. This session will turbocharge your ability to create an IT team that is not just great at problem-solving but is great at both things customers want. You will discover the two things that your customers want and how you and your department can successfully win friends and influence your reputation throughout the organization.

Beau Sorensen is currently the Chief Operating Officer of First Choice Home Health. Beau has over 25 years of experience in the healthcare industry and has extensive experience in leading teams, developing software, and training. He has worked with companies around the country, helping them improve results, increase loyalty, and enhance job satisfaction.

Topics: Culture
  • Sessions
9:00 - 9:50 AM

[1 CPE] Practical Uses of Automation and AI: So Easy Even Your CEO Can Use Them

  Presented by Summit Technology

There is a lot of chatter about new AI, machine learning, and automation technology hitting the market. Many of these hyped capabilities are available to you in the technology platforms that you are already paying for. Join us for some simple live examples demonstrating how you can utilize some of these tools to capitalize on new technology to enhance your personal productivity.

Topics: Infrastructure
10:00 - 10:50 AM

[1 CPE] Data Resiliency, Heightened Cyber Threats, & Proving Your Capabilities for Cyber Insurance

  Presented by Herb Williams, Field Technical Director • Cohesity

Join this session for a walk-through of a real-world ransomware attack and the necessary steps to recover. We will cover a cyber insurance form to show how it aligns with our “Protect, Detect, Recover” point of view, and we will speak to the specific capabilities associated with each point.

Topics: Data Storage, Information Security
11:00 - 11:50 AM

[1 CPE] Backup ≠ Cyber Recovery

  Presented by Rubrik

Legacy backups are vulnerable to attacks, can’t help you find threats, and force you to do wholesale restores that drag out recovery times. Rubrik Zero Labs found that only 5% of organizations were able to return to business continuity or normal operations within one hour of discovering a CyberAttack. A modern cyber recovery solution is critical for Security and IT teams to be cyber-resilient. Learn how you can make your data indestructible.

Topics: Information Security
12:00 - 12:50 PM

[1 CPE] Saving Money in IT Project Management and Operations

  Presented by Michael J. Berry • Member and Presenter • PMI Northern Utah Chapter

In this session, you will learn how to save time, effort, and costs through Operational Excellence in IT Project Management. Also covered will be Operations that use patterns found in Agile, Lean, and Artificial Intelligence.

Michael J. Berry is the founder and chief consultant for Red Rock Research, a 17-year-old IT training and consulting company he founded in 2007. Michael's professional consulting work has taken him all over the US, to Australia, to the Arctic Circle, and to Europe helping large companies optimize their project management and other production processes. Michael has worked in the software industry for over 35 years, specifically in Finance, Medical, and Manufacturing software. He is the creator of the Stable Framework™, an Operational Excellence performance management system for IT, and has a book blog you can read at https://blog.RedRockResearch.com.

Topics: Strategic Management
1:00 - 1:50 PM

[1 CPE] Don’t Get Caught in the Dark! How New Technology Can See Attackers

  Presented by Eos Systems

This presentation will focus on security practices and compliance that can prevent and quickly detect the next attack. Join this session to learn how you can gain visibility with a Security Command Center.

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Ron Boyer
Director, Information Technology
Summit County, UT

John Coker
Manager, Information Systems
Central Utah Water Conservancy District

Milada Copeland
Chief Information Security Officer
Progrexion Holdings Inc

Chad Davis
Manager, Information Security, Risk, and Compliance
Xevant

James Duckett
Manager, Technology Division
City of St George

David Fletcher
Chief Technology Officer
State of Utah

Robert Frailey
Manager, Information Systems
Utah Medical Products

Patrick Funk
Director, Hosting Technologies
State of Utah

John Gleave
Director, Information Technology
Springville City

Steve Howard
Principal Cyber Information Assurance Analyst
Northrop Grumman

Mary Huth
Sr Manager, Internal Audit
Protiviti

Waqas Javed
Director, Information Technology
Utah Zoological Society

John Jorgensen
Director, Information Technology
Thanksgiving Point

Tom Judd
Director, Information Technology
Filevine

Kevin Lopez
Director, Information Technology
UT Dept of Technology Services

George McEwan
Chief Strategy Officer
State of Utah

Bobette Phillips
Director, Information Systems & Security
UT Tax Commission

Brad Porter
Director, Information Technology
UP Railroad Employees Health Systems

Greg Pugh
Information System Security Officer
Space Dynamics Laboratory

Scott Rushforth
Chief Operations Officer
Horizon Credit Union

Jake Schroeder
Head of Information Security
Route

Jon Shurtliff
Director, Technology
Oakdell Egg Farms

Nyle Stoddard
Manager, Information Security
RR Donnelley

Jason Struck
Chief Information Security Officer
Salt Lake City Corporation

George Sturua
Manager, Corporate IT
Kuhl Clothing Company

Paul Tew
Information Security Officer
Snow College

Tyler Tholen
Sr Manager, Cyber Security
Honeywell

Bryan Wilkins
Manager, Enterprise Information Security
Space Dynamics Laboratory

Danny Yeo
Director, Information Technology
Brigham Young University

Shawn Young
Director, Cyber Security
Barnes Group, Inc.

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Hitachi Vantara

Hitachi Vantara

Hitachi Vantara
Hitachi Vantara helps enterprises create and derive value from their data. Its solutions include best-in-class data management, IT infrastructure and analytics products, IoT solutions and Smart Spaces technologies for a broad range of industries.
Visit Website
Sonatype

Sonatype

Sonatype
Sonatype is the developer-friendly full-spectrum software supply chain management platform that helps organizations and software developers.
Visit Website

SILVER SPONSORS

Cohesity

Cohesity

Cohesity
Cohesity delivers a web-scale platform that simplifies data protection, consolidates file and object services, provides instant access to test/dev copies, spans from the edge to the cloud, and performs in-place searches and analytics.
Visit Website
Illumio

Illumio

Illumio
Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes how workloads and devices are communicating, creates granular segmentation policies which only allow necessary communication, and automatically isolates ransomware and breaches. Assume breach. Minimize impact. Increase resilience.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website
Sanity Solutions

Sanity Solutions

Sanity Solutions
Sanity Solutions, Inc. is headquartered in Denver, CO with offices in Minnesota and Utah. We focus on comprehensive IT solutions and establishing ourselves as a trusted adviser. We believe in delivering a legendary experience professionally and personally.
Visit Website
Summit Technology

Summit Technology

Summit Technology
At Summit Technology our goal is to break the mold of the standard MSPs and VARs and forge an entirely new type of technology consultancy – a Curated Technology Partner.
Visit Website

BRONZE SPONSORS

Airlock Digital

Airlock Digital

Airlock Digital
Airlock Digital delivers forward-thinking endpoint protection solutions which enable organizations to implement rapid, scalable allowlisting and execution control.
Visit Website
Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
Critical Start

Critical Start

Critical Start
Critical Start Managed Cyber Risk Reduction solutions ensure continuous security monitoring and mitigation, delivering robust protection against threats. With our platform’s maturity assessments, event analytics, response capabilities, and a team of expert risk mitigators, achieve the highest level of cyber risk reduction and increase confidence in attaining desired security maturity.
Visit Website
Proactive Network Management

Proactive Network Management

Proactive Network Management
Proactive Network Management Corporation provides network consulting and state-of-the-art network management tools to the commercial and public sector.
Visit Website
Sevco Security

Sevco Security

Sevco Security
Sevco is the cloud-native CAASM platform delivering the industry’s most accurate, real-time IT asset inventory. Hundreds of companies rely on Sevco's 4D Asset Intelligence engine to bridge the gap between IT and security teams. By providing a continuously updated inventory of assets, Sevco autonomously identifies and closes previously unknown security gaps, while dramatically improving incident response. Sevco’s patented asset telemetry uncovers significant security gaps and out-of-compliance assets in every deployment without fail. Founded in 2020 and based in Austin, Texas.
Visit Website
Syringa Networks

Syringa Networks

Syringa Networks
Syringa Networks is an industry-leading Managed Network Service Provider. We specialize in dedicated Internet, Voice, SD-WAN, Colocation, and Security. As a local provider, with more than 2,000 miles of fiber​, we deliver quick installs and access to live customer support, 24/7.
Visit Website
ValorC3

ValorC3

ValorC3
ValorC3 is a modern data center, cloud and connectivity partner that delivers agile, scalable IT solutions tailored to the relentless mid-market enterprise. Valor meets clients where they’re at and gets them where they need to grow, helping them navigate the rapidly changing digital landscape with flexible, high-density data centers, extensive infrastructure expansion capabilities, low latency networks, strong partnerships and decades of industry expertise.
Visit Website
VLCM

VLCM

VLCM
VLCM has been in business for over thirty years, and in that time, we’ve helped thousands of customers throughout the Rocky Mountain West find the proper solutions for their IT needs.
Visit Website

EXHIBITORS & ASSOCIATIONS

Adlumin

Adlumin

Adlumin
Adlumin's security and compliance automation platform helps organizations manage evolving threats and cybersecurity compliance requirements.
Visit Website
ARMA Salt Lake City

ARMA Salt Lake City

ARMA Salt Lake City
Information is at the center of everything an organization does. Records are information assets and hold value for the organization. ARMA International is the authority on managing records and information paper and electronic.
Visit Website
ASIS Salt Lake City

ASIS Salt Lake City

ASIS Salt Lake City
Founded in 1955, ASIS is dedicated to increasing the effectiveness and productivity of security professionals by developing educational programs and materials that address broad security interests, such as the ASIS Annual Seminar and Exhibits.
Visit Website
Axelliant

Axelliant

Axelliant
Axelliant design, deploy, implement, and manage advanced IT solutions and services with agility and responsiveness through the entire solution delivery process. Axelliant is there to guide customers on their personalized journey to success.
Visit Website
CDW

CDW

CDW
With full-stack expertise, CDW helps you design, orchestrate and manage technologies that drive business success.
Visit Website
Commvault

Commvault

Commvault
Commvault is a worldwide leader in delivering data readiness. Commvault's backup and recovery software enables you to protect, manage, and use your data, while managing it in a consistent, compliant way.
Visit Website
CompuNet

CompuNet

CompuNet
CompuNet is a leading U.S. information technology partner, headquartered in Boise, Idaho. The firm specializes in consultation, design and implementation services specifically tailored to solve business problems. With a best-in-class engineering staff and approach, CompuNet focuses on building lasting relationships that prioritize client satisfaction over sales through every step of the journey.
Visit Website
Eos Systems

Eos Systems

Eos Systems
Eos Systems, a leader in cyber security and technology delivery services, has been helping clients solve complex technology challenges for over 20 years.
Visit Website
InfraGard Salt Lake City

InfraGard Salt Lake City

InfraGard Salt Lake City
InfraGard is a cooperative undertaking between the U.S. Government (led by the FBI) and an association of businesses, academic institutions, state and local law enforcement agencies.
Visit Website
ISACA Utah

ISACA Utah

ISACA Utah
The aim of the ISACA Utah Chapter is to sponsor local educational seminars and workshops, conducts regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the area.
Visit Website
LogRhythm

LogRhythm

LogRhythm
LogRhythm, Inc. is an independent security intelligence company that integrates security information and event management, log management, file integrity monitoring, network forensics, and host forensics.
Visit Website
Macrium Software

Macrium Software

Macrium Software
Complete data security is more important than ever. Whether you’re protecting your home or business PCs, Macrium has a range of reliable solutions for you.
Visit Website
MicroAge

MicroAge

MicroAge
Discover how MicroAge can help your business succeed with technology solutions, from managed services to cybersecurity and IT infrastructure.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website
PMI Northern Utah

PMI Northern Utah

PMI Northern Utah
PMI is the international non-profit association for advancing the profession of project management. The organization administers the Project Management Professional (PMP) certification program and puts on international and regional seminars.
Visit Website
Qohash

Qohash

Qohash
Qohash finds, tracks, and safeguards the world’s most sensitive data. The Qostodian platform deploys in minutes to discover risks, pinpoint insider threats, and track how data propagates between people in real-time. Security teams can understand their sensitive data clearly and quickly, and prioritize threats at the pace of business.
Visit Website
Rain Networks

Rain Networks

Rain Networks
Rain Networks is a Value-Added-Distributor located near Seattle, Washington. The company was founded in 2003 with the vision of bringing the world's best technology products to the people that need them to make their business run more efficiently.
Visit Website
Verkada

Verkada

Verkada
Verkada provides cloud-managed security solutions—video surveillance, access control, alarms, and more—designed to simplify physical security and deliver real-time insights for safer, smarter buildings.
Visit Website
Zscaler

Zscaler

Zscaler
As a leader in Gartner’s Magic Quadrant, Zscaler enforces business policy, mitigates risk and provides twice the functionality at a fraction of the cost of current solutions, utilizing a multi-tenant, globally-deployed infrastructure.
Visit Website

Interested in becoming part of our next Salt Lake City event?

CONTACT US FOR INFO

Salt Lake City

Salt Palace Convention Center
Room 355
100 SW Temple
Salt Lake City, UT 84101

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.