F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Spokane 2023 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Spokane EVENTS

AT A GLANCE

September 14th, 2023
8:30am – 4:30pm

Spokane Convention Center
Ballroom 111ABC
334 W. Spokane Falls Blvd
Spokane, WA 99201

Directions & Parking

KEYNOTE: [1 CPE] AI, ML, and the Cybersecurity Checklist

  Presented by Paul Carugati • Global Head of Information Security, Syngenta

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Zero Trust—Let’s Dive into Security

  Presented by Kevin Heide, Director of Enterprise Networking • Cerium Networks

Spend the morning with us while we explore the world of Zero Trust Architecture—but with a twist. Instead of a high-level overview of this strategic cybersecurity approach, we'll get hands-on and show you practical examples using tools and environments that most of us are already familiar with.

Buckle up and join us on this exciting journey as we learn how to integrate different elements and policies across our organizations. We'll also focus on optimizing our policies and enhancing threat protection.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Go Hack Yourself: War Stories from ~20k Pentests

  Presented by Habibeh Deyhim, Director of Customer Success • Horizon3.ai

In an ecosystem where you know you're being targeted daily, how can you prove you're secure? Are you finding and fixing the most critical attack paths, logging the right data, and alerting on the right events? Do you know if you're ready to respond to an incident and are your security controls configured and integrated correctly? All this effort is supposed to measurably reduce your risk, but is any of it working?

Join Habibeh Deyhim, Director of Customer Success at Horizon3.ai, to learn a proven way to find, fix, and verify that you're secure. Habibeh will discuss several real-world examples of what autonomous pentesting discovered in networks just like yours. And you'll hear more about how fast and easy it was to safely compromise some of the biggest (and smallest) networks in the world - with full domain takeover in a little more than a few hours. Learn how you can safely do the same in your own network today!

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Modernizing Physical Security

  Presented by Verkada

In this session, we’ll look at the technologies at the forefront of enterprise building security. Connected security devices can provide users with real-time insights and a full picture of the health and safety of their environments. We’ll explore how to minimize security risks, workplace frustrations, and costly inefficiencies with best–in–class solutions that provide a scalable way to easily configure, monitor and respond to events from anywhere. Learn how modernizing your physical security can help you seamlessly safeguard the physical world –– without sacrificing privacy –– to operate safer, smarter buildings.

1:00 - 1:50 PM

[1 CPE] Maelstrom of Security

  Presented by Jerry Petru, President • InfraGard Washington

This session is designed for individuals responsible for their organizations' Confidentiality, Integrity, and Availability from the front door firewall administrator with IDS/IPS, cloud, compliance, data governance, and networking all the way to the Chief Executives of an organization. In a world of ever-changing threat landscapes, this session will cover the overall magnitude of the challenge! We’ll discuss the evolution as it took place and what to do about fixing what is in our hands today.

We’ll cover how to speak to the C-Suite and get the business side of the conversation to move toward better security hygiene and answer the question of how much security is enough. This session is truly about information security risk. The risk is Very High for all organizations. The NIST 800-30 defines Very High Risk as that of a threat event that could be expected to have multiple severe or catastrophic adverse effects on organizational operations, organizational assets, individuals, other organizations, or the Nation. The discussion will be open and free-flowing, covering real-world business issues and providing a platform to ask your questions.

Bio: Jerry Petru is the President of the Washington State InfraGard Chapter and a Fellow of the British Computer Society, The Charted Institute for IT. He is an innovative and technically sophisticated professional, offering substantial years of broad-based experience in evaluating large corporate systems. Powered with a comprehensive background in development and implementation, he has authored more than forty-seven different courses based on AIX, Encryption, Linux, Networking, Security, and Virtualization technologies teaching to an audience of tens of thousands around the world for the past twenty-five years.

Mr. Petru is equipped with a proven track record of success in designing and implementing systems and policies based on Confidentiality, Integrity, and Availability to meet business continuity and disaster recovery for long-range strategic plans of Fortune 100 Companies. He is also armed with stellar qualifications in all facets of project lifecycle development, from initial analysis and conceptual design to implementation, quality review, and enhancement to optimize operational efficiencies that improve business and IT operations.

Topics: Information Security, Strategic Management
2:00 - 2:50 PM

[1 CPE] Zero Trust Framework as a Baseline for Identity Management

  Presented by Andrew Massi, Digital Security Consultant, Identity • Entrust

With the recent increase in cyber-attacks that involve the use of weak / compromised credentials, it is critical for organizations to secure their environment and resources with a Zero Trust framework and a Phishing resistant RBA in mind. Organizations can establish trust through verifiable, phishing-resistant, certificate-based identities across users, devices, and apps to implement a secure first line of defense against cyberattacks.

Today’s technology leaders must navigate different tools and methodologies yet remain confident they’re quantifying risk effectively. During this session, we'll be discussing emerging digital security trends and how your peers are shaping the way the market approaches cybersecurity and risk management.

Specifically, we will discuss:

  • How to establish trust across users, devices, and apps that secure a first line of defense
  • How to support the Zero Trust framework through the adoption of Phishing resistant passwordless authentication
Topics: Information Security
Paul CarugatiPaul CarugatiGlobal Head of Information Security, Syngenta
3:00 - 3:50 PM

[1 CPE] AI, ML, and the Cybersecurity Checklist

  Presented by Paul Carugati • Global Head of Information Security, Syngenta

The dynamic threat landscape is evolving as new cyberattack methods are introduced daily. Generative Artificial Intelligence (AI) and Machine Learning (ML) algorithms are equally evolving and becoming more sophisticated. Navigating AI/ML services against your organization’s cybersecurity risk posture is a maturing discipline, but it may be more familiar than you think. Let’s discuss the practical risk elements of AI & ML in the modern enterprise and how best to protect, detect, respond, and recover from cybersecurity incidents.

Paul is a seasoned IT and Information Security leader with over 20 years of experience in Fortune 300 enterprises. An accomplished information security executive, Paul has a proven ability in the successful execution of global Cybersecurity and Risk Management programs. Paul specializes in building high-performing security teams and fostering a culture of data protection through business enablement, achieving positive, measurable behavioral change through accountability and integrity.

Topics: Artificial Intelligence, Digital Experience, Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] How to Stop East/West Attacks in Your Data Center

  Presented by Aruba Networks

70% of all breaches are caused by endpoint security vulnerabilities, followed by lateral movement in the data center. Halt that hacker traffic. Attend this session to learn about a new category of data center switch that combines best-of-breed L2/3 switching with the industry's first hardware-accelerated programmable processor. This new tool augments your malware and ransomware detection and response capabilities by delivering stateful firewall services inline, at scale, with wire-rate performance and orders of magnitude improvement over traditional data center L2/3 switches. You will learn how to gain visibility and enforce security policy for all East/West flows between workloads to protect the critical assets in your data center.

Topics: Data Center Technology
10:00 - 10:50 AM

[1 CPE] Seeing Your Attack Surface Through the Eyes of an Adversary

  Presented by Palo Alto Networks

Modern attack surfaces are dynamic. Without clear visibility that is constantly updated, it is all too easy to have persistent exposures and unmanaged assets. Security practitioners can only be as good as the data they have, so having a strong foundation of continuous discovery and monitoring ensures you can keep up with modern, dynamic attack surfaces to find, prioritize, and mitigate exposures as they arise.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Plan, React, and Recover: An Incident Response Workshop (Part 1)

  Presented by Dan Brown and Ronald Watters, Cybersecurity Advisors • Cybersecurity and Infrastructure Security Agency

Incident Management can be frequently looked at in a causal manner –– until it happens to you. Do you have the correct plan in action? Have you ever tested your incident plan? Join us for an extended workshop to discuss the parties that need to be involved in this response plan. Our speakers will also share strategies on how often you should test and update your plan.

The Cyber Risk Landscape will also be examined. While threat actors are coming from multiple areas, you will be prepared to consider the insider threat as well. Join us for this two-hour session for an extensive workshop for you to develop a thorough incident response plan.

The experts on this panel are Cyber Security Advisors for the federal agency known as CISA, The Cybersecurity and Infrastructure Security Agency. They will help you assess your environment, identify vulnerabilities, and provide education about the latest threats you will face. CISA has many resources available for you and those will be discussed as well.

Speaker Details:

Dan Brown serves as the Cybersecurity Advisor for Eastern Washington and is based in Spokane, WA. He supports CISA's mission of leading the national effort to understand, manage, and reduce risk to our cyber and physical infrastructure.

He offers CISA resources that coordinate cyber preparedness, risk mitigation, and incident response. He provides cybersecurity resources, including assessments, to public and private stakeholders in the nations’ sixteen critical infrastructures, including auxiliary support for state, local, tribal, and territorial government entities.

Prior to joining CISA, Dan worked in information technology and cybersecurity for more than 25 years. Most recently, he worked at the Community Colleges of Spokane as their Information Security Officer (ISO). Before that, he worked for 17 years at Washington State University as an Assistant Director of Systems and Security.

His education includes an undergraduate degree in Management Information Systems (MIS) from Eastern Washington University and an M.B.A. from Washington State University. Current certifications include CISSP, CISM, and ITIL foundation.

Ron Watters serves as the Region 10 Private Sector Cybersecurity Advisor for CISA. Based in Seattle, WA, he supports the Department of Homeland Security (DHS) mission of strengthening the security and resilience of the nation's critical infrastructure.

His program coordinates cyber preparedness, risk mitigation, and incident response, and provides cyber security resources, including assessments, to the nation’s sixteen critical infrastructure sectors and state, local, tribal, and territorial government entities.

Before joining DHS, Ron served 27 years with the U.S. Navy and Naval Reserve as a Submarine Sonar Technician and Diver. Ron interviewed and was hired as the Region X Cybersecurity advisor in June of 2017 and has filled that position presently.

Topics: Information Security
12:00 - 12:50 PM

[1 CPE] Plan, React, and Recover: An Incident Response Workshop (Part 2)

  Presented by Dan Brown and Ronald Waters, Cybersecurity Advisors • Cybersecurity and Infrastructure Security Agency

Incident Management can be frequently looked at in a causal manner –– until it happens to you. Do you have the correct plan in action? Have you ever tested your incident plan? Join us for an extended workshop to discuss the parties that need to be involved in this response plan. Our speakers will also share strategies on how often you should test and update your plan.

The Cyber Risk Landscape will also be examined. While threat actors are coming from multiple areas, you will be prepared to consider the insider threat as well. Join us for this two-hour session for an extensive workshop for you to develop a thorough incident response plan.

The experts on this panel are Cyber Security Advisors for the federal agency known as CISA, The Cybersecurity and Infrastructure Security Agency. They will help you assess your environment, identify vulnerabilities, and provide education about the latest threats you will face. CISA has many resources available for you and those will be discussed as well.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Intune: What’s New and What’s Next

  Presented by Chris McDuffie, Vice President of Cloud Architecture • Structured

Microsoft Intune is quickly becoming a strategic part of not only device management, but compliance and security as well. Structured will cover what’s new and how Intune will impact your Windows PC strategy management.

Topics: Infrastructure
2:00 - 2:50 PM

[1 CPE] How Do You Secure ANY-ANY-NOW?

  Presented by Gregory Pepper, Security Architect, Office of the CTO • Check Point Software Technologies

  • ANY Device
  • ANY Location
  • Access To Corporate Resources NOW

Today, more than any other time in history, we are digitally connected. With a continuous rise in mobile-related attacks, and an ever-increasing use of mobile devices to perform business tasks, protecting your organization from mobile threats is more critical than ever. Despite our best efforts, threats and breaches continue to increase.

Join Greg Pepper for this insightful presentation to learn about the latest mobile and user protection including Check Point’s Harmony suite for securing users and access. Today’s mobile security needs to prevent the download of malicious files to mobile devices, not just from the web and email but also from collaboration tools like Teams and Slack, and others. Learn how you can achieve 99.7% efficacy against zero-day threats across your entire enterprise leveraging ThreatCloud, an industry-leading threat intelligence solution.

Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Jennifer Aguiar
Supervisor, Information Technology
Fairchild Air Force Base

Kevin Bleek
Director, Information Technology
Sunshine Health Facilities, Inc.

Dan Brown
Cybersecurity Advisor
CISA

Laurel Caldwell
Director, IT Services
Latah County, ID

Ben Calvert
Chief Information Officer
Vista Title & Escrow

Ken Clegg
Director, Information Security
Ministry Brands

James Davidson
Chief Information Officer
Ferry County Health

Sherri Davis
Vice President, Information Technology
CHAS Health

Shane Fuller
Assistant Director, Technology Services
Community Colleges of Spokane

Pete Hansen
Chief, Information Technology
Fairchild Air Force Base

Melissa Mason
Vice President, Information Security
Umpqua Bank

Andrew Rausch
Chief Information Officer
Lydig Construction

Justin Roach
Manager, Information Security
Spokane County

Joe Sams
Manager, Information Systems
Teck American, Inc.

Naci Seyhanli
IT Security Analyst
Spokane Regional Health District

Steve Simmons
Director, Center for Network Computing
Eastern Washington University

Michael Sloon
Director, Innovation Technology Services Dept
City of Spokane, WA

Derek Southerly
Sr Manager, Digital Automation
Harman International

Cory Staheli
Chief Information Officer
Trans-System, Inc.

Troy Wunderlich
VP & Director, Risk Management
Washington Trust Bank

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

Cerium Networks

Cerium Networks

Cerium Networks
Cerium is a recognized innovator and leading provider of a full suite of collaboration, contact center, networking, data center, and security solutions. We help medium to large businesses in the Northwest plan for and then realize the positive impact of technology on their business operations, strategies, and user experiences.
Visit Website
Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
Entrust

Entrust

Entrust
Entrust’s identity and data security solutions enable the Zero Trust maturity journey needed to help protect your organization, and we deliver convenient, secure digital interactions for your customers and citizens.
Visit Website
Exbabylon

Exbabylon

Exbabylon
Exbabylon is a uniquely Northwest boutique IT firm with a team of energetic, experienced IT professionals who have a passion for making things work better, smarter and more secure through on premise, cloud and hybrid solutions.
Visit Website
Horizon3.ai

Horizon3.ai

Horizon3.ai
Horizon3.ai enables organizations to continuously assess the security posture of their enterprise across many attack surfaces.
Visit Website
ImageSource

ImageSource

ImageSource
ImageSource is a software and systems integration firm specializing in Enterprise Content Management.
Visit Website

BRONZE SPONSORS

Adlumin

Adlumin

Adlumin
Adlumin's security and compliance automation platform helps organizations manage evolving threats and cybersecurity compliance requirements.
Visit Website
baramundi

baramundi

baramundi
baramundi Software offers efficient, secure, and cross-platform management of workstation environments. With over 20 years of UEM experience across the globe, over 4,000 customers benefit from our intuitive, single-interface platform.
Visit Website
Cohesity

Cohesity

Cohesity
Cohesity delivers a web-scale platform that simplifies data protection, consolidates file and object services, provides instant access to test/dev copies, spans from the edge to the cloud, and performs in-place searches and analytics.
Visit Website
Extreme Networks

Extreme Networks

Extreme Networks
Extreme Networks, Inc. (EXTR) delivers software-driven networking solutions that help IT departments everywhere deliver the ultimate business outcome: stronger connections with customers, partners and employees.
Visit Website
GCSIT

GCSIT

GCSIT
GCSIT is a different kind of engineering firm. We act as your personal technology optimization team to create and maintain custom-built, agile infrastructure. We help you transition to the right technology solutions to better handle complex and dynamic challenges.
Visit Website
LMG Security

LMG Security

LMG Security
LMG Security is your one-stop shop for proactive cybersecurity! Our expert team speaks and trains at major global conferences, and has been featured in the Wall Street Journal, Today Show, and New York Times! With LMG Security, you receive cutting-edge cybersecurity guidance and services.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website
TDS Telecom

TDS Telecom

TDS Telecom
TDS Telecommunications LLC (TDS Telecom/TDS®) delivers high-speed internet, TV entertainment, and phone services to a mix of rural and suburban communities throughout the U.S. With 1.2 million connections, TDS is a rapidly growing technology company. Powered by fiber-optics and new industry-leading technologies, TDS delivers up to 8 Gigabit internet speeds and offers internet-protocol based TV entertainment solutions along with traditional phone services. TDS also offers businesses VoIP advanced communications solutions, dedicated internet service, data networking, and hosted-managed services.
Visit Website
Thales

Thales

Thales
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks.
Visit Website
ValorC3

ValorC3

ValorC3
ValorC3 is a modern data center, cloud and connectivity partner that delivers agile, scalable IT solutions tailored to the relentless mid-market enterprise. Valor meets clients where they’re at and gets them where they need to grow, helping them navigate the rapidly changing digital landscape with flexible, high-density data centers, extensive infrastructure expansion capabilities, low latency networks, strong partnerships and decades of industry expertise.
Visit Website

EXHIBITORS & ASSOCIATIONS

AWS

AWS

AWS
Whether you're looking for compute power, database storage, content delivery, or other functionality, AWS has the services to help you build sophisticated applications with increased flexibility, scalability and reliability.
Visit Website
CISA

CISA

CISA
CISA is the Nation’s risk advisor, working with partners to defend against today’s threats and collaborating to build more secure and resilient infrastructure for the future.
Visit Website
CompuNet

CompuNet

CompuNet
CompuNet is a leading U.S. information technology partner, headquartered in Boise, Idaho. The firm specializes in consultation, design and implementation services specifically tailored to solve business problems. With a best-in-class engineering staff and approach, CompuNet focuses on building lasting relationships that prioritize client satisfaction over sales through every step of the journey.
Visit Website
ESET

ESET

ESET
For more than 30 years, ESET® has been developing industry-leading IT security software and services to protect businesses, critical infrastructure, and consumers worldwide.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
InfraGard Washington

InfraGard Washington

InfraGard Washington
InfraGard is a partnership between the FBI and the private sector representing businesses, academia, state , local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the U.S.
Visit Website
Keysight

Keysight

Keysight
Keysight delivers advanced visibility and validation solutions to connect and secure the world.  Visibility solutions (network packet brokers, taps and CloudLens) eliminate security blind spots in hybrid networks. Threat Simulator continuously validates enterprises’ security architectures to ensure they are working as defined to detect and stop threats.
Visit Website
MSPAA

MSPAA

MSPAA
The MSP Association of America (MSPAA) has been established with three primary missions, each of which follows a unique trajectory aimed at providing our clients, members, and students with a collaborative and informative pathway towards building a future for technology, business, and education.
Visit Website
Optiv

Optiv

Optiv
Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website
Rain Networks

Rain Networks

Rain Networks
Rain Networks is a Value-Added-Distributor located near Seattle, Washington. The company was founded in 2003 with the vision of bringing the world's best technology products to the people that need them to make their business run more efficiently.
Visit Website
Verkada

Verkada

Verkada
Verkada provides cloud-managed security solutions—video surveillance, access control, alarms, and more—designed to simplify physical security and deliver real-time insights for safer, smarter buildings.
Visit Website

Interested in becoming part of our next Spokane event?

CONTACT US FOR INFO

Spokane

Spokane Convention Center
Ballroom 111ABC
334 W. Spokane Falls Blvd
Spokane, WA 99201

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.