F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Spokane 2022 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Spokane EVENTS

AT A GLANCE

October 13th, 2022
8:30am – 4:30pm

Spokane Convention Center
Ballroom 111ABC
334 W. Spokane Falls Blvd
Spokane, WA 99201

Directions & Parking

Venue Accessibility

KEYNOTE: [1 CPE] Enterprise Data: A Curse and a Blessing

  Presented by Sasi Pillay, Ph.D. • Vice President of IT Services & CIO, Washington State University

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Theater Three
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Co-Managed IT: The Modern MSP Relationship

  Presented by Exbabylon

A pragmatic conversation about what the modern relationship should look like between internal IT teams and external consultants, MSPs, MSSPs and VARs. As organizations embark on digital transformation journeys that require a cloud forward approach, the skills, competencies, and experience of a strategic partner who can collaborate and build initiatives becomes more apparent and important. Navigating the shifting expectations of IT Leadership as business demands evolve and change from the team that just keeps the network up to their new role as a business influencer through data intelligence, business intelligence, automation, and big data/AI.

Topics: Culture, Information Security, Strategic Management
10:00 - 10:50 AM

[1 CPE] PCI-DSS 4.0: How to Become and Stay Compliant

  Presented by Structured

This presentation will discuss the difficulties of becoming and staying compliant with Payment Card Industry (PCI) requirements. The venerable version 3.2.1 is well on the way to retirement, and the updated Data Security Standard (DSS) 4.0 is loaded with numerous changes and enhancements that must be complied with. Whether you are just beginning with PCI for your organization or have many years of experience, there are many challenges -- both old and new -- that can create roadblocks to compliance. With emerging technologies such as zero-trust architecture ready for implementation, find out how to best use these controls for your organizational goals. The presentation will cover the requirements, trouble areas to be aware of, and how you can utilize specific technology in your compliance effort.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Securing a Distributed Network with ZTNA and a Cybersecurity Mesh Platform

  Presented by Fortinet

Securing connected resources and the different pieces of a distributed network can be challenging. Join this session to explore the advantages of using a ZTNA architecture to provide secure, application-based access over the traditional VPN access most enterprises use today. We’ll also examine how employing Gartner’s Cybersecurity Mesh Architecture can simplify Network and Security operations.

Topics: Information Security, Infrastructure
1:00 - 1:50 PM

[1 CPE] Migrating to a Multi-Cloud Environment: A Non-idealistic Approach

  Presented by Cerium Networks

Multi-Cloud. A new buzzword? Or a path of digital transformation on which many have unknowingly already embarked?

During this session, we will explore the definition of "Multi-Cloud", the maturity level of various providers - including your private cloud(s), and the competencies required to manage mission-critical applications in these cloud(s). We will review multiple migration and consumption models as well as business outcomes. The move to Multi-Cloud deployment is a strategy generally explored for greater efficiency, greater flexibility, and reduced complexity. However, these deployments often include increased compliance and security requirements, potentially additional cost, and certainly a new skill set which may not exist within your organization. We will explore these topics and more in our discussion on migrating a data center to a Multi-Cloud environment.

Topics: Data Center Technology
2:00 - 2:50 PM

[1 CPE] Challenge the Threat of Ransomware: Best Practices to Prepare, Mitigate, and Recover

  Presented by Zerto

Ransomware attacks continue to rise in volume, severity, and costs to businesses attacked while cyber criminals continue inventing new and unexpected methods to spread malware and encrypt critical data. As attacks continue to specialize, no organization is immune to ransomware. So how do you avoid being forced to pay a ransom, disruptions to services and supply chains, and damage to your brand in the news? Join recovery and data protection experts from Zerto to discuss best practices for when – not if – ransomware strikes. Be prepared to minimize downtime, data loss, and mitigate the risks of ransomware. In this session, you’ll learn:

  • Ransomware 101: A breakdown of a ransomware attack and how it affects systems
  • Steps you can take to reduce the likelihood of attacks on your system
  • How to choose a best-in-class recovery solution for ransomware
  • How you can best harden your recovery systems against attacks
  • How to create a recovery plan to react and recover quickly
  • Real example of a company hit twice by ransomware and how they improved recovery time from weeks to minutes by planning ahead
Topics: Information Security
Sasi Pillay, Ph.D.Sasi Pillay, Ph.D.Vice President of IT Services & CIO, Washington State University
3:00 - 3:50 PM

[1 CPE] Enterprise Data: A Curse and a Blessing

  Presented by Sasi Pillay, Ph.D. • Vice President of IT Services & CIO, Washington State University

Many organizations collect data and use it for a variety of purposes. Often the data is gathered, contained, processed, and reported from a single system. It lacks the holistic view of looking at data from an enterprise perspective. Only if data is viewed with an enterprise lens, insights can be gained. This insight allows organizations to make decisions whether to detect, mitigate, and prevent issues, or increase market share, improve customer satisfaction, and deliver other positive outcomes. This talk will focus on addressing how to use data from disparate systems for organizational good and, in higher education, how this typically translates to improved student success and experience.

Dr. Pillay was recently named ORBIE CIO of the Year in the enterprise category for organizations with over $800 million in annual revenue. Pillay was recognized at the 2022 CIO of the Year® ORBIE® Awards in June.​

Dr. Pillay is the recipient of NASA’s Exceptional Service Medal and the Outstanding Leadership Medal. He is also the recipient of the Presidential Rank Award recognizing him as a Meritorious Executive in the U.S. federal government. He was recognized as one of the Federal 100 winners based on his positive impact on NASA and the community. He was also named as one of the top 25 IT leaders in Government citing his technology vision, clout among peers in other agencies, and his ability to show concrete results. The Northeast Ohio Software Association recognized him as the CIO of the Year in 2008.​ ​

Topics: Data Storage
  • Sessions
9:00 - 9:50 AM

[1 CPE] Have We Reached the End of the “Internet Frontier”?

  Presented by Tonaquint Data Center

Join Tonaquint Network Engineer, Matt Holzwarth, for a discussion on what’s left to conquer in our globally connected world.

Matt Holzwarth has been in the IT field professionally for over 15 years and has extensive experience in Windows Domain environments, Windows Operating Systems (Server and Workstation), MAC OS (Server and Workstation), Linux (Primarily Ubuntu), Routing and Switching (Primarily Cisco, Mikrotik Router OS, and Ubiquiti EdgeMax), vmWare, Wireless WAN and LAN technologies, VPN’s (IPSEC, L2tp, EOIP, Psudowire, and PPTP), VLANs, and much more.

Topics: Data Center Technology
10:00 - 10:50 AM

[1 CPE] Breaking the Ransomware Attack Chain

  Presented by Akamai

Despite consistent increases in security spending, ransomware remains an ever-growing threat to businesses. Surprisingly, the ransomware itself, the malware that does the encryption, is only a part of a larger, equally dangerous, attack chain. Considering the entire chain offers defenders more opportunities to thwart the attack before mass encryption can occur.

In this session, we’ll provide details on how microsegmentation can prevent adversarial techniques that precede and follow the deployment of ransomware itself. By turning our attention to the entire kill chain, a path towards minimizing the likelihood, impact, and recovery time of ransomware becomes clear.

In this session you will learn:

  • Practical steps you can take to disrupt the kill chain before ransomware can be deployed
  • How to leverage AI to map complex environments and expedite the path towards policy enforcement that drastically reduces the impact of ransomware
  • How advancements in host-based segmentation are helping businesses achieve an infrastructure that enables rapid remediation of ransomware events without disrupting business operations

Join Speaker Chris McIntosh, GCSA/GCSE SE Akamai Segmentation

  • Sr Solutions Engineer, Pacific Northwest Akamai Segmentation
  • 19 years working in IT, last 4+ focused in Networking, Security
  • Positions include Support, Admin and Systems Engineer
  • Networking, Storage, Security, and Backup background
Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Microsoft 365 Security Best Practices

  Presented by CompuNet

Migrating to the M365 relieves many burdens from IT administrators – fewer servers to manage, no more patching, fewer arguments with the network team over whose fault that latest outage is. Unfortunately, M365 still operates under a shared responsibility model and part of your team's responsibility is ensuring appropriate security controls are in place.

In this session, we will discuss general security around M365. We will cover some of the major security settings that always require attention and discuss some others that may need to be tailored to your specific environment.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Protecting Your Data from Ransomware Where it Lives: Your Last Line of Defense

  Presented by Hitachi Vantara

If an attack happens and it makes it all the way to your data, then they have already broken through all of your walls. Where your data lives IS your last line of defense, which is why the Armed Forces that protects the USA trusts Hitachi to protect them. Prevention is great and all but without that last line of defense, you’re a sitting duck. Attend this session to learn how Hitachi serves as your last line of defense against ransomware attacks.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Cyber Security: A National Threat

  Presented by Arctic Wolf

When searching for vulnerable targets, cyber hackers do not care how big or small your company is. As world events continue to unfold in China and Russia, cyber warfare has become a national threat to American companies.

Join Arctic Wolf's session to learn how IT leaders can be proactive, rather than reactive to protect their companies from cyber hackers.

Topics: Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] How AI Can Think Like an Attacker

  Presented by Darktrace

In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen and to recover if compromised. In this session, we’ll unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] The Future of DaaS

  Presented by Right! Systems & Cloud Software Group (Formerly Citrix)

Hear from Cloud Software Group about the current and future state of DaaS / VDI, Access, Security, and Application Delivery.

11:00 - 11:50 AM

[1 CPE] SOC Transformation

  Presented by Structured & Palo Alto Networks

Ransomware is on the rise and cyberattacks are getting more sophisticated. Despite investments in infrastructure security tools, cybercriminals are still getting through to the data. And when they take the data down, they take down the entire organization—and hold it for ransom or exfiltration. As the importance of data grows, we need to trust our data is safe and resilient, no matter where it resides. It’s time for a new approach.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Aruba User Experience Insight (UXI)

  Presented by Structured & Aruba Networks

Aruba User Experience Insight (UXI) is a cloud-based application performance monitoring solution that validates network health and troubleshoots problems that affect day-to-day user experience. Ideal for campus and branch environments alike, UXI assumes the role of an end-user, evaluating the performance, connectivity, and responsiveness of network infrastructure and applications.

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Jennifer Aguiar
Supervisor, Information Technology
Fairchild Air Force Base

Kevin Bleek
Director, Information Technology
Sunshine Health Facilities

Dan Brown
Information Security Officer
Community Colleges of Spokane

Laurel Caldwell
Director, IT Services
Latah County, ID

Ben Calvert
Manager, Information Technology
Vista Title & Escrow

Ken Clegg
Director, Information Security
Ministry Brands

Nathan Cook
Vice President, Information Technology
Special Olympics of Washington

Ian Cornwall
Director, Information Technology
METER Group

James Davidson
Chief Information Officer
Ferry County Health

Sherri Davis
Vice President, Information Technology
CHAS Health

Shane Fuller
Manager, Data Center & Network Operations
Community Colleges of Spokane

Clint Hagen
Manager, Information Technology
NEW Health Programs Association

Pete Hansen
Chief, Information Technology
Fairchild Air Force Base

Frank Larson
Director, Information Technology
Vyanet Operating Group

Melissa Mason
Sr Information Security Analyst
Umpqua Bank

Alan Nelson
Director, Operations
AssuriCare

Dave Nevala
Director, Information Technology
Lukins & Annis PS

Dennis Reed
Manager, Information Technology
Southern Cross

Joe Sams
Manager, Information Systems
Teck American, Inc.

Naci Seyhanli
IT Security Analyst
Spokane Regional Health District

Steve Simmons
Director, Center for Network Computing
Eastern Washington University

Michael Sloon
Director, Innovation Technology Services Dept
City of Spokane, WA

Derek Southerly
Manager, Global IT Operations
Harman International

Cory Staheli
Chief Information Officer
Trans-System, Inc.

Duane Swizer
SVP, Chief Technology Officer
Columbia Bank

Troy Wunderlich
Vice President & Director, Risk Management
Washington Trust Bank

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

Akamai

Akamai

Akamai
Akamai is the leading content delivery network (CDN) services provider for media and software delivery, and cloud security solutions.
Visit Website
Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
Cerium Networks

Cerium Networks

Cerium Networks
Cerium is a recognized innovator and leading provider of a full suite of collaboration, contact center, networking, data center, and security solutions. We help medium to large businesses in the Northwest plan for and then realize the positive impact of technology on their business operations, strategies, and user experiences.
Visit Website
CompuNet

CompuNet

CompuNet
CompuNet is a leading U.S. information technology partner, headquartered in Boise, Idaho. The firm specializes in consultation, design and implementation services specifically tailored to solve business problems. With a best-in-class engineering staff and approach, CompuNet focuses on building lasting relationships that prioritize client satisfaction over sales through every step of the journey.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
Exbabylon

Exbabylon

Exbabylon
Exbabylon is a uniquely Northwest boutique IT firm with a team of energetic, experienced IT professionals who have a passion for making things work better, smarter and more secure through on premise, cloud and hybrid solutions.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface & the power to take on the ever-increasing performance requirements of the borderless network – today and into the future.
Visit Website
Hitachi Vantara

Hitachi Vantara

Hitachi Vantara
Hitachi Vantara helps enterprises create and derive value from their data. Its solutions include best-in-class data management, IT infrastructure and analytics products, IoT solutions and Smart Spaces technologies for a broad range of industries.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
Right! Systems

Right! Systems

Right! Systems
Right! Systems, Inc. is an IT management services company that provides business-driven, multi-vendor IT solutions in Network Infrastructure, Virtualization, Storage, Unified Communications, Telepresence, Security, Mobility and Professional Services.
Visit Website
ValorC3

ValorC3

ValorC3
ValorC3 is a modern data center, cloud and connectivity partner that delivers agile, scalable IT solutions tailored to the relentless mid-market enterprise. Valor meets clients where they’re at and gets them where they need to grow, helping them navigate the rapidly changing digital landscape with flexible, high-density data centers, extensive infrastructure expansion capabilities, low latency networks, strong partnerships and decades of industry expertise.
Visit Website

BRONZE SPONSORS

ExtraHop

ExtraHop

ExtraHop
ExtraHop delivers enterprise cyber analytics that allow you to quickly investigate threats, ensure the delivery of critical applications, and secure your investment in the cloud.
Visit Website
Extreme Networks

Extreme Networks

Extreme Networks
Extreme Networks, Inc. (EXTR) delivers software-driven networking solutions that help IT departments everywhere deliver the ultimate business outcome: stronger connections with customers, partners and employees.
Visit Website
InterVision

InterVision

InterVision
Providing IT solutions, Infrastructure and Services for the Cloud Ecosystem (private, hybrid and public), allowing our customers to achieve the full potential of a Software Defined Data Center.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website
Tanium

Tanium

Tanium
Tanium gives the world's largest enterprises and government organizations the unique power to secure, control and manage millions of endpoints across the enterprise. 
Visit Website

EXHIBITORS & ASSOCIATIONS

Blackfoot Communications

Blackfoot Communications

Blackfoot Communications
Blackfoot offers advanced communications solutions throughout the Pacific Northwest and Mountain West. Based in Missoula, Montana, Blackfoot delivers voice, data, cloud and IT services to homes and businesses.
Visit Website
ESET

ESET

ESET
For more than 30 years, ESET® has been developing industry-leading IT security software and services to protect businesses, critical infrastructure, and consumers worldwide.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
IIA Spokane

IIA Spokane

IIA Spokane
Established in 1941, The Institute of Internal Auditors (IIA) is an international professional association. The IIA is the internal audit profession's global voice, recognized authority, acknowledged leader, chief advocate, and principal educator.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website
Rain Networks

Rain Networks

Rain Networks
Rain Networks is a Value-Added-Distributor located near Seattle, Washington. The company was founded in 2003 with the vision of bringing the world's best technology products to the people that need them to make their business run more efficiently.
Visit Website
Wowrack

Wowrack

Wowrack
Wowrack is a global cloud service provider; offering various Hosting services including Managed Hosting Solutions, Dedicated Server Solutions, Colocation, Virtualization, Disaster Recovery, Backup services and much more!
Visit Website

Interested in becoming part of our next Spokane event?

CONTACT US FOR INFO

Spokane

Spokane Convention Center
Ballroom 111ABC
334 W. Spokane Falls Blvd
Spokane, WA 99201

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.