F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Thank you to everyone who attended

INTERFACE Spokane 2025

The Lilac City's Premier Technology Event will return in 2026

INTERFACE Spokane 2025

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Spokane EVENTS

AT A GLANCE

October 16th, 2025
8:30am – 4:30pm

Spokane Convention Center
Ballroom 111ABC
334 W. Spokane Falls Blvd
Spokane, WA 99201

Directions & Parking

KEYNOTE: [1 CPE] From Frameworks to Firewalls: A Practical Guide to AI Security

  Presented by Collin Miller • Director, Cloud Security, Structured

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Achieving Ransomware Resilience and Disaster Recovery in a Multi-Cloud World

  Presented by Mike Dusche, DR & Cyber Resilience Specialist • HPE

Discover how to achieve an always-on 24/7 business, ensuring that customers and stakeholders can expect uninterrupted access to their data and applications. Learn how to solve for Ransomware Resilience, Disaster Recovery, and Multi-Cloud mobility for virtualized environments, with continuous data protection (CDP) for any app, any cloud, and any threat. With the right solutions in place, your organization can seamlessly protect critical data and applications, mitigate the risk of ransomware attacks, and maintain business continuity.

Explore strategies for achieving ransomware resilience, automated disaster recovery planning and testing, and flexible hybrid-cloud capabilities that allow you to move applications and scale capacity on demand. By integrating comprehensive data protection measures, you can ensure compliance with regulatory mandates and provide robust resilience against evolving cyber threats. This approach empowers your IT team to focus on strategic initiatives by reducing the burden of manual recovery processes and ensuring rapid restoration of operations.

Topics: Business Continuity / Disaster Recovery, Information Security
10:00 - 10:50 AM

[1 CPE] How to Make AI a Reality in Your Organization

  Presented by Marni Carmichael, Vice President, Marketing • ImageSource

AI adoption is accelerating, yet many organizations struggle to transition AI projects from proof-of-concept to production. The AI Empowerment Blueprint is a structured framework that helps businesses overcome common AI adoption barriers, align AI initiatives with business goals, and implement a governance strategy that ensures ethical and effective AI deployment.

This session will guide attendees through a six-step methodology for AI success, covering key phases such as AI exploration, business value alignment, governance frameworks, and implementation best practices. Learn how to identify AI opportunities, mitigate risks, and build a scalable AI strategy that delivers real business value.

Whether you're an executive, technologist, or entrepreneur, this presentation will equip you with actionable insights and a proven roadmap to maximize AI's impact within your organization.

Topics: Artificial Intelligence, Data Management
11:00 - 11:50 AM

[1 CPE] Bridging Zero Trust and SASE: A Unified Approach to Modern Cybersecurity

  Presented by Fortinet

This will be a panel discussion on how organizations can effectively bridge Zero Trust and SASE to create a unified, adaptive cybersecurity architecture that meets the demands of today’s hybrid workforce and threat landscape.

Key Takeaways:

  • Understand the core principles of Zero Trust and SASE, and how they complement each other.
  • Learn practical strategies for implementing a unified approach without adding complexity or disrupting operations.
  • Gain insights into real-world use cases and lessons learned from organizations successfully integrating these frameworks.

Speakers:

  • Joel Robnett, Director of Sales, Tech Heads, Inc.
  • Steve Sims, Owner, Cruxial Technology Group
  • Michael Lippman, Regional Channel SE US, Fortinet
  • Eric Foster, Systems Engineer, Fortinet
Topics: Information Security
1:00 - 1:50 PM

[1 CPE] How to Spend Wisely on Your IT Needs in Spokane: An Interactive Panel Discussion

  Presented by INTERFACE Advisory Council

Your budget has shrunk, and vendor costs have risen. Sound familiar?

So many IT leaders in Spokane are dealing with the challenges of vendor acquisitions that produce huge cost increases. At times it can seem there is no way to achieve everything expected with the budget allotted. How does anyone succeed in this environment?

Spokane isn’t home to the largest corporations in the country, and your IT budget reflects that. In this panel discussion, the Spoane Advisory Council will share their tricks to maximizing the impact of the money you have to spend. Please join us for an open discussion that will include your questions. We will share experiences in working with vendors, stretching a dollar, and finding alternatives to huge price increases from the vendor community.

Moderator: Adam Pyle, Information Systems Security Manager, Pyrotek, Inc.

Panelists:

  • Laurel Caldwell, Director, IT Services, Latah County, ID
  • Ben Calvert, Chief Information Officer, Vista Title & Escrow
  • Kai Dailey, Executive Director, Ragland Institute
  • Naci Seyhanli, IT Security Analyst, Spokane Regional Health District
Topics: Strategic Management
2:00 - 2:50 PM

[1 CPE] Threat Detection: Intelligence Insights from the Front Lines

  Presented by David Pier, Sr Sales Engineer • Zscaler

In 2024, Red Canary detected nearly 93,000 threats—an increase of more than a third from the previous year—driven by expanded visibility into cloud and identity infrastructure. For the seventh year, our Threat Detection Report analyzes the most prevalent cyber threats, evolving attack techniques, and the incidents we help customers resolve.

This session will highlight key trends, including email threats, infostealers, and LLM hijacking in the cloud, while breaking down the top 10 MITRE ATT&CK® techniques and most prevalent threats in customer environments. Attendees will gain actionable insights into detection, testing, and prevention strategies to enhance their security posture against today’s evolving threats.

Topics: Information Security
Collin MillerCollin MillerDirector, Cloud Security, Structured
3:00 - 3:50 PM

[1 CPE] From Frameworks to Firewalls: A Practical Guide to AI Security

  Presented by Collin Miller • Director, Cloud Security, Structured

As organizations accelerate AI adoption, the security landscape is evolving just as quickly. This presentation explores the foundations of AI security, starting with an overview of emerging AI-specific threats and the importance of structured defense approaches. We will examine leading frameworks—MITRE ATLAS and the NIST AI Risk Management Framework—and how they guide organizations in identifying, assessing, and mitigating AI risks.

We will then focus on Microsoft 365 Copilot, outlining its security architecture and built-in protections, followed by a technical case study on the Echo Leak vulnerability, demonstrating real-world exploitation risks. s a bonus, we will also take a look at the recent SalesDrift vulnerability, and the growing attack surface around LLM chatbot integration and supply chain risks.

Finally, we will provide an overview of Structured's AI security service offerings. Attendees will gain both strategic insights and practical approaches to securing AI systems, preparing them to meet the challenges of an AI-powered future.

Collin Miller has over two decades of experience in networking and IT security -- installing and supporting various types of security software and hardware. He has demonstrated skills in project management, evaluating new security technologies, testing, troubleshooting, and developing procedures and policies for new systems and technology. His past areas of focus include Mobile Device Management and Security, Data Loss Prevention, Zero Trust Network Access, Next-Generation Firewall, and Security Event and Information Management. His current area of focus is Cloud Security

Topics: Artificial Intelligence, Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] AI Agents & Automation: How They’re Changing the Way We Work

  Presented by Hunter Helfgott, AI Solutions Consultant • Cerium Networks

AI-powered agents are generating a lot of buzz. But what do they actually do?

In this session, you will see how organizations are starting to use AI-powered agents to solve business challenges and create new opportunities. We'll cover advanced tools like custom GPTs, Copilot Studio, and Azure AI Foundry and see how they can be leveraged to drive AI innovation and streamline workflows. This session offers a deep dive into automation's role in simplifying complex processes, enhancing customer experiences, and improving productivity.

Topics: Artificial Intelligence
10:00 - 10:50 AM

[1 CPE] Modernizing the SOC: Transforming your Security Operations

  Presented by JR Silverthorne, Partner Solutions Consultant, West • Palo Alto Networks

So many industry players want to speak to and about tool consolidation and a platformization play in the cybersecurity space. We want to examine the classical SOC model and turn it on its head and reveal how a suite of capabilities enable root cause analysis, risk context, correlation, and automation across an open platform that accepts the widest and largest variety of data sources from the endpoint to the data center to the cloud. Our approach –– Xtended Security Intelligence Automation Management.

If your interest is in achieving the lowest MTTR and MTTD, if you want to detect security incidents and remediate faster, then your path forward has to unify workflows, utilize embedded intelligence, and provide automated responses. Let us show you how Palo Alto with 20,000 employees operates their SOC with just 15 people.

Topics: Information Security, Infrastructure
11:00 - 11:50 AM

[1 CPE] Wi-Fi 7 Unleashed: Powering the Next Generation of Connectivity

  Presented by Josh Jaster, SMB Sales Engineering Manager • HPE Aruba Networking

Wi-Fi 7 is just the beginning. The HPE Aruba Networking 700 Series Access Points go beyond the standard with higher capacity, denser IoT support, advanced wired security with MACsec, software-configurable radios, and more. Powered by AOS-10 and Aruba Central, every Wi-Fi 7 model adds AI-driven optimization, sustainability automation, and deep client insights. The result is a unified platform that transforms next-gen wireless into the foundation for real-time business, IoT innovation, and future-ready connectivity. Join us to discover how the 700 Series goes beyond Wi-Fi 7 to deliver the performance, intelligence, and security your network demands.

Topics: Infrastructure
1:00 - 1:50 PM

[1 CPE] AI in the Eyes of the Threat Actors vs. the Cyber Defense Line

  Presented by Kelly Brazil, Sr Director, Security Architects • Juniper Networks

In today’s cybersecurity world, AI is making fast moves to improve the defense line, but adversaries are also using AI to build attacks faster and be more precise in entering the victim. Social Engineering, targeted phishing attacks where the text is generated by GenAI engines - make it even simpler to get in.

To overcome what is offered as Attacks as a Service, the Security barrier needs fully meshed security policies, in-line Malware detection powered by AI, and effective ways to identify and mitigate Zero Day Attacks. The goal is to defend an Enterprise faster than the adversaries are moving and mitigate potential breaches by real-time/in-line defense.

Kelly Brazil runs the global Security Specialist Architects team at HPE Juniper Networks. Kelly has 25+ years of experience in cybersecurity and has previously held technical leadership roles at Palo Alto Networks, Fortinet, and various successful security startups. He has traveled the globe as a public speaker evangelizing the latest trends in cybersecurity. Kelly is also active in the Open-Source Software (OSS) community and has developed DevOps automation tools in use by developers, systems administrators, and security practitioners around the world.

Topics: Artificial Intelligence, Information Security
2:00 - 2:50 PM

[1 CPE] Real-Time Threat Mitigation with AI-Driven SASE: A Practical Approach

  Presented by Joe Fontes, Sales Engineer, PNW • Cato Networks

This discussion highlights the current threat landscape associated with current AI tools and how those same foundational technologies can be used to automate threat responses. We will delve into an understanding of current adversaries, an overview of existing defenses, and strategies on extending current defense postures.

Topics: Information Security, Infrastructure

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Jennifer Aguiar
Supervisor, Information Technology
Fairchild Air Force Base

Kevin Bleek
Director, Information Technology
Sunshine Health Facilities, Inc.

Dan Brown
Cybersecurity Advisor
CISA

Laurel Caldwell
Chief Information Officer
Latah County, ID

Ben Calvert
Chief Information Officer
Vista Title & Escrow

Paul Carugati
Head of Information Security
Syngenta

Ken Clegg
Vice President, IT Security
Greater Sum Ventures

Kai Dailey
Executive Director
Ragland Institute

James Davidson
Director, Information Technology
Ferry County Health

Shane Fuller
Assistant Director, Technology Services
Community Colleges of Spokane

Chad Goodhue
Director, Technology Services
Walla Walla County, WA

Bill Gowland
Manager, Information Technology
Buck Knives

Pete Hansen
Chief of Information Technology
Fairchild Air Force Base

Roopam Kakoti
Chief Technology Officer
Gestalt

Steve Lee
Director, Information Technology
Integrus Architecture

Udo Madumere
Manager, Networks and Engineering
Kaiser Aluminum

Melissa Mason
VP, Information Risk Compliance
Umpqua Bank

Dave Nevala
Director, Information Technology
Lukins & Annis PS

Adam Pyle
Manager, Global Cybersecurity
Pyrotek, Inc.

Joe Sams
Manager, Information Systems
Teck American, Inc.

Naci Seyhanli
IT Security Analyst
Spokane Regional Health District

Steve Simmons
Director, Center for Network Computing
Eastern Washington University

Adam Skoog
Manager, Information Technology
City of Sandpoint, ID

Derek Southerly
Sr Manager, Digital Automation
Harman International

Cory Staheli
Chief Information Officer
Trans-System, Inc.

Borre Ulrichsen
Chief Information Officer
Gonzaga University

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

Cato Networks

Cato Networks

Cato Networks
Cato provides the world’s most robust single-vendor SASE platform, converging Cato SD-WAN and a cloud-native security service edge, Cato SSE 360, into a global cloud service. Cato SASE Cloud optimizes and secures application access for all users and locations everywhere.
Visit Website
Cerium Networks

Cerium Networks

Cerium Networks
Cerium is a recognized innovator and leading provider of a full suite of collaboration, contact center, networking, data center, and security solutions. We help medium to large businesses in the Northwest plan for and then realize the positive impact of technology on their business operations, strategies, and user experiences.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet helps organizations across the public and private sectors protect the systems, data, and services that keep businesses and communities running. From government agencies and schools to enterprises and service providers, leaders rely on Fortinet to secure critical infrastructure, ensure operational continuity, and defend against evolving cyber threats. Our Security Fabric platform unifies networking and security to deliver the visibility, control, and efficiency organizations need to operate confidently, whether virtual, in the cloud, or on-premises.
Visit Website
HPE

HPE

HPE
At Hewlett Packard Enterprise, we aim to be the industry’s leading provider of hybrid IT, built on the secure, next-generation, software-defined infrastructure that will run customers’ data centers today, bridge them to multi-cloud environments tomorrow, and power the emerging intelligent edge that will run campus, branch and Industrial IoT applications for decades to come. All delivered through a world class services capability.
Visit Website
ImageSource

ImageSource

ImageSource
ImageSource is a software and systems integration firm specializing in Enterprise Content Management.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website
Zscaler

Zscaler

Zscaler
As a leader in Gartner’s Magic Quadrant, Zscaler enforces business policy, mitigates risk and provides twice the functionality at a fraction of the cost of current solutions, utilizing a multi-tenant, globally-deployed infrastructure.
Visit Website

BRONZE SPONSORS

Arista Networks

Arista Networks

Arista Networks
Arista Networks is an industry leader in data-driven, client-to-cloud networking for large data center, campus, and routing environments. Arista’s award-winning platforms deliver availability, agility, automation, analytics, and security through an advanced network operating stack.
Visit Website
Barracuda

Barracuda

Barracuda
Barracuda Networks is the worldwide leader in Security, Application Delivery and Data Protection Solutions. More than 200,000 global customers trust Barracuda to safeguard their employees, data, and applications from a wide range of threats. Barracuda provides easy, comprehensive and affordable solutions for email protection, application protection, network protection and data protection. We are continually innovating to deliver tomorrow’s security technology, today.
Visit Website
CompuNet

CompuNet

CompuNet
CompuNet is a leading U.S. information technology partner, headquartered in Boise, Idaho. The firm specializes in consultation, design and implementation services specifically tailored to solve business problems. With a best-in-class engineering staff and approach, CompuNet focuses on building lasting relationships that prioritize client satisfaction over sales through every step of the journey.
Visit Website
Exbabylon

Exbabylon

Exbabylon
Exbabylon is a uniquely Northwest boutique IT firm with a team of energetic, experienced IT professionals who have a passion for making things work better, smarter and more secure through on premise, cloud and hybrid solutions.
Visit Website
Neat

Neat

Neat
Neat designs simple and elegant pioneering video devices for Microsoft Teams and Zoom Rooms, helping make the meeting space experience the best it can be. Continuously pushing boundaries, Neat devices are incredibly easy to install, set up and use.
Visit Website
VLCM

VLCM

VLCM
VLCM has been in business for over thirty years, and in that time, we’ve helped thousands of customers throughout the Rocky Mountain West find the proper solutions for their IT needs.
Visit Website

EXHIBITORS & ASSOCIATIONS

Abnormal

Abnormal

Abnormal
The Abnormal Behavior Platform uses superhuman understanding of human behavior to protect against phishing, social engineering, and account takeovers.
Visit Website
Arrow ECS

Arrow ECS

Arrow ECS
AI, cloud, cybersecurity, data and infrastructure are in our sweet spot. We offer a range of emerging and established technology solutions from leading vendors.
Visit Website
CISA

CISA

CISA
CISA is the Nation’s risk advisor, working with partners to defend against today’s threats and collaborating to build more secure and resilient infrastructure for the future.
Visit Website
Cruxial Technology Group

Cruxial Technology Group

Cruxial Technology Group
Our team specializes in translating complex threats into actionable strategies, focusing on business resilience and streamlining security operations so you can stay focused on growth.
Visit Website
Ednetics

Ednetics

Ednetics
For more than 25 years Ednetics has been on a mission to directly address the challenges faced by schools in acquiring and utilizing technology. Recognizing the close relationship between higher education, libraries, and technological advancements, we expanded our focus to serve the public sector and our technology portfolio has grown. From modernizing operations with communications, network, cybersecurity, and data infrastructure to improving safety with physical security solutions. Today, we proudly support and empower educational institutions, libraries, local and state governments throughout the Western US.
Visit Website
Ericsson

Ericsson

Ericsson
Ericsson’s enterprise wireless solutions enable organizations to innovate, operate, and grow anywhere — without constraints. Ericsson NetCloud, Cradlepoint routers, and Enterprise 5G solutions provide the flexibility of public and private 5G, with the zero trust security of simplified SASE.
Visit Website
Fatbeam

Fatbeam

Fatbeam
Connect to What’s Next Reliability. Scalability. Service. When speeds and connectivity are guaranteed, you have less to worry about and more time to focus on what will move your organization forward. Fatbeam makes this possible. We help businesses scale with lit and dark fiber options that improve network performance while eliminating connectivity issues and access.
Visit Website
Halcyon

Halcyon

Halcyon
Halcyon formed in 2021 by a team of cybersecurity industry veterans after battling the scourge of ransomware (and advanced threats) for years, at some of the largest global security vendors. Halcyon is focused on building products and solutions for mid-market and enterprise customers.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
HPE Juniper Networking

HPE Juniper Networking

HPE Juniper Networking
Juniper Networks is now part of HPE. Together, we're building industry-leading, secure, AI-native networks – purpose-built with and for AI. As AI and networking converge, we're driving a bold transformation across enterprises, service providers, and cloud operators.
Visit Website
InfraGard Washington

InfraGard Washington

InfraGard Washington
InfraGard is a partnership between the FBI and the private sector representing businesses, academia, state , local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the U.S.
Visit Website
LaunchPad Inland Northwest

LaunchPad Inland Northwest

LaunchPad Inland Northwest
LaunchPad INW is a professional services organization committed to leading a regional, collaborative initiative to strengthen our regional innovation ecosystem. We deliver inclusive programs and events that connect, mentor and inspire people and companies to achieve greater success.
Visit Website
Miicor

Miicor

Miicor
Miicor, Inc is a security solutions company serving the unique requirements and needs of customers throughout the Pacific Northwest.
Visit Website
MSPAA

MSPAA

MSPAA
The MSP Association of America (MSPAA) has been established with three primary missions, each of which follows a unique trajectory aimed at providing our clients, members, and students with a collaborative and informative pathway towards building a future for technology, business, and education.
Visit Website
Nuvodia

Nuvodia

Nuvodia
Nuvodia is an award-winning Managed Services Provider with certified technology experts that have one mission – make your business better. Nuvodia proudly serves the IT support needs of businesses from Pacific Northwest to the Desert Southwest, and Radiology Informatics nationwide.
Visit Website
Optiv

Optiv

Optiv
Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential.
Visit Website
Ruckus Networks

Ruckus Networks

Ruckus Networks
Ruckus Networks is redefining connectivity around the globe. We build secure wired and wireless access networks for organizations that place a premium on connectivity experiences for end-users as well as simplicity and lower-cost-per-connection for IT.
Visit Website
Tech Heads

Tech Heads

Tech Heads
Tech Heads provides IT infrastructure design, procurement, managed services and managed security services, with a 25+ year track record.
Visit Website
Xiologix

Xiologix

Xiologix
Xiologix is a technology solution provider of business driven multi-vendor IT solutions to customers throughout the US and Canada. They offer a wide variety of hardware and software products from the world's leading IT companies.
Visit Website

Interested in becoming part of our next Spokane event?

CONTACT US FOR INFO

Spokane

Spokane Convention Center
Ballroom 111ABC
334 W. Spokane Falls Blvd
Spokane, WA 99201

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.