F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

INTERFACE Anchorage

Wednesday, April 22nd, 2026 | 8:30 AM AKDT

Register Learn More

INTERFACE Anchorage 2026

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

REGISTER TO ATTEND
EXHIBIT AT THE EVENT

AT A GLANCE

April 22nd, 2026
8:30am – 4:30pm

Dena’ina Convention Center
Tikahtnu Ballroom
600 W 7th Avenue
Anchorage, AK 99501

Directions & Parking

Venue Accessibility

KEYNOTE: [1 CPE] The New Media Stack: How AI is Rewriting Cybersecurity Journalism

  Presented by Karissa Breen • Founder & Head of Cybersecurity Journalism, KBI.Media
 Keynote presentation brought to you by Business Improvement Group

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Theater Three
  • Theater Four
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Why Layered Identity Defense Is the Best Offense

  Presented by Sean Deuby, Principal Technologist, Americas • Semperis

Cyberattackers are adept at finding ways through your defenses and into identity systems like Active Directory, Entra ID, and Okta, and endpoint defenses won't stop them. From there, they can move laterally, escalate privileges, access sensitive data and resources, and inject malware or ransomware. Implementing a layered defense that includes identity threat detection and response (ITDR) and robust identity recovery is key to true cyber resilience.

Join Sean Deuby, Principal Technologist, Semperis, to learn:

  • How layered defense has changed over time
  • Why ITDR and identity recovery are essential to a robust layered defense strategy
  • How a layered defense can help you combat attacks that are designed to bypass traditional attack-detection methods
  • Which best practices lead to identity—and cyber—resilience
Topics: Business Continuity / Disaster Recovery
10:00 - 10:50 AM

[1 CPE] Speaking the Language of Risk

  Presented by Tom Ruoff, Principal Consultant • ImageSource

Organizations face rapidly evolving cyber threats, yet many still view technology as a cost center rather than a strategic partner. This presentation reframes the conversation by translating technical risks into business and financial terms leaders understand. Attendees will learn how to identify Business Essential Functions (BEFs), quantify operational and financial impacts, and apply practical risk‑estimation methods. By establishing a common language of risk, leaders can align priorities, invest where it matters most, and meaningfully reduce enterprise exposure. The session equips both executives and IT teams with tools to build consensus and drive smarter, outcome‑based cybersecurity decisions.

Tom Ruoff serves as Principal Consultant for ImageSource, Inc. providing cybersecurity consulting services (risk assessments, threat hunting, pen testing, breach remediation, security architectures, policies, business impact assessment) to commercial clients including Native American Tribes and Tribal Casinos, he is also a founder and current CEO of Zorse Cyber. Tom retired from the Dept of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA) in June 2023, as Chief, Methodology Branch, supervising vulnerability assessments for elections, power generation/distribution, and pipelines, and Federal Government IT systems. Before DHS, Tom was the Director of Systems Division at Northrop Grumman, developing cross domain solutions (CDS) for National Security Agency (NSA) and Central Intelligence Agency (CIA). Air Force veteran with tours at NSA, CIA element of the National Geospatial-Intelligence Agency, and Defense Intelligence Agency He is a Level III Federally Certified Program Manager, PMP, CISSP, CMMI Associate, MS/BS degrees in physics and electrical engineering.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] State of the Union: Annual Information Security Report

  Presented by Oscar Minks, President • FRSecure

The result of over 100 incident cases handled by the FRSecure response team in the last two years, President Oscar Minks will dive into the latest threats and response techniques you need to know—and what you can do to minimize the risk and impact of similar events. The breakdown will cover Business Email Compromise, Ransomware, and Internal Compromise. You can’t afford to miss it!

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Leading Through Crisis: IT Lessons from Alaska’s Emergency Response

  Presented by INTERFACE Advisory Council

In October 2025, Typhoon Halong caused widespread disruption across Western Alaska, testing the resilience of infrastructure, communications, and response teams. The event offered a powerful case study in organizational resilience. While many had disaster recovery plans in place, the ability to execute under pressure—while maintaining clear, reliable communication—proved to be the defining factor.

IT teams were at the center of response efforts, from restoring systems to enabling critical lines of communication for employees, partners, and communities. The experience revealed that resilience isn’t just technical—it’s operational.

In this interactive panel, regional leaders share hard-earned lessons from the field. Discover how to strengthen your response plans, run effective drills, and ensure your organization is ready when it matters most. Audience Q&A will provide an opportunity to explore challenges specific to your environment.

Panelists:

  • Paul Fussey, Operations Manager, Alaska Land Mobile Radio
  • Aaron Mute, Director, Information Technology, Association of Village Council Presidents
  • Brian Noonan, Systems Engineer, Alaska Railroad Corp.
  • Dave Reilly, Planning Program Manager, AK Department of Military and Veterans Affairs
Topics: Business Continuity / Disaster Recovery, Strategic Management
2:00 - 2:50 PM

[1 CPE] From Cyber Risk to Resilience: Turning Insight Into Action

  Presented by Chad Alessi, Managing Director, Cybersecurity • CTG

Many organizations generate cybersecurity assessments and compliance reports, but struggle to translate them into actions that meaningfully reduce operational risk. This session explores practical strategies for turning cybersecurity insights into decision frameworks that support operational continuity and executive risk management. Drawing on experiences from critical infrastructure and healthcare environments, the talk highlights how organizations can move from compliance-driven security to true cyber resilience.

Topics: Information Security
Karissa BreenKarissa BreenFounder & Head of Cybersecurity Journalism, KBI.media
3:00 - 3:50 PM

[1 CPE] The New Media Stack: How AI is Rewriting Cybersecurity Journalism

  Presented by Karissa Breen • Founder & Head of Cybersecurity Journalism, KBI.Media
 Keynote presentation brought to you by Business Improvement Group

The way cybersecurity professionals consume information is undergoing a fundamental shift. For years, the industry relied on a traditional media pipeline, like vendor announcements, PR outreach, journalist coverage, and static articles. But the rise of large language models and AI-powered discovery tools is dismantling that model.

Instead of searching for articles or relying on outdated reports, professionals ask AI systems to synthesize information, explain threats and summarize events. In this new environment, AI effectively becomes the front page of the internet, determining which voices, sources and insights are surfaced.

In this keynote, Karissa Breen (KB) examines how AI is reshaping cybersecurity journalism, the rise of “reference media” that LLMs trust and cite and why credibility and original reporting matter more than ever in the algorithmically mediated game. Drawing on her experience building a modern cybersecurity media platform, Breen will explore what the next generation of cyber media looks like and how organizations can adapt to a future where AI curates the conversation and this means for staying on top of cyber content and the retention of the knowledge.

Karissa Breen, more commonly known as KB, is crowned a LinkedIn ‘Top Voice in Technology’ and widely recognized across the global cybersecurity industry. A serial entrepreneur, she is the co-founder of the TMFE Group, a portfolio of cybersecurity-focused businesses spanning an industry-leading media platform, a specialist marketing agency, a content production studio, and the executive headhunting firm, MercSec. Now based in the United States, KB oversees US editorial operations and leads the expansion of the group’s media footprint across North America, while maintaining a strong presence in Australia, and the broader global market. She is the former Producer and Host of the streaming show 2Fa.tv, and currently sits at the helm of journalism for the group’s flagship arm, KBI.Media, the independent cybersecurity media company. As a cybersecurity investigative journalist, KB hosts her globally-renowned podcast, KBKast, where she interviews leading cybersecurity practitioners, CISOs, government officials including heads-of-state, and industry pioneers from around the world. The podcast has been downloaded in over 65 countries with more than 400,000 global downloads, influencing billions of dollars in cybersecurity budgets. KB is known for asking the hard questions and extracting real, commercially relevant insights. Her approach provides an uncolored, strategic lens on the evolving cybersecurity landscape, demystifying complex security issues and translating them into practical intelligence for executives navigating risk, regulation, and rapid technological change.

Topics: Artificial Intelligence, Strategic Management
  • Sessions
9:00 - 9:50 AM

[1 CPE] Proving Cyber Resilience: Measuring Outcomes, Not Effort

  Presented by Tony Taylor, Sales Engineer • Horizon3.ai

Most security programs measure effort — not outcomes. Organizations patch thousands of vulnerabilities, deploy dozens of tools, and run annual tabletop exercises… but when an attacker shows up, none of that matters.

What matters is whether they can prove their defenses actually work.

In this talk, Horizon3.ai shares how leading organizations are using autonomous pentesting to see their environment through the attacker’s eyes — continuously, safely, and at scale. By shifting from assumptions to proof, they’ve learned to:

  • Prioritize what’s exploitable. Focus limited resources on the weaknesses that truly put the business at risk that are known to be abused by threat actors.
  • Quickly fix what matters. Close the loop from find → fix → verify and reduce your exploitable attack surface.
  • Reduce attacker dwell time. Use pentest results to precisely deploy honeyTokens to detect compromise early, and to continuously prove your EDR and SIEM are tuned and working as intended.

Cyber resilience isn’t about being perfect — it’s about getting better over time. And the only perspective that truly matters is the attacker’s.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Securing AI Adoption: Protecting Data, Applications, and APIs in the Era of Generative AI

  Presented by Steven Gautier, Principal Solutions Architect • Thales

Organizations across every industry are rapidly adopting Generative AI, machine learning, and AI-powered applications to improve efficiency, automate processes, and unlock new insights from their data. However, these technologies also introduce new security challenges.

AI systems rely heavily on enterprise data, APIs, and interconnected applications, creating potential risks such as sensitive data exposure, prompt injection attacks, API abuse, and unauthorized access to AI models.

  • In this session, we will explore the security architecture required to safely deploy AI technologies within modern enterprise environments.
  • Attendees will learn practical strategies for protecting the data that powers AI models, the APIs that deliver AI services, and the applications that integrate AI into business workflows.
  • The session will also cover emerging AI-specific threats, governance considerations, and best practices organizations can use to maintain security, compliance, and trust while accelerating AI adoption.
  • Participants will leave with a clear framework for securely enabling AI innovation across cloud, hybrid, and on-premises environments.
Topics: Artificial Intelligence, Information Security
11:00 - 11:50 AM

[1 CPE] Data Resilience in the Age of Attack: Protect What Matters

  Presented by Landra Pierce, Product Strategy Technologist • Veeam

Cyberattacks are no longer a distant threat; they are a reality every IT team must be prepared for. When an attack occurs, your data becomes both the primary target and the key to recovery. Many organizations still rely on backup strategies that are designed for hardware failures or accidental deletions, rather than today’s threats, like ransomware, insider risk, and automated attacks. This disconnect creates vulnerabilities, especially when backups become an overlooked entry point in your security strategy. In this session, we will address these challenges to help you better protect your organization.

This session is ideal for IT professionals who want greater confidence in safeguarding their data and peace of mind. We will examine the most common oversights that leave organizations, including those in government, education, healthcare, and other sectors, exposed to cyberthreats. You’ll discover how teams are advancing beyond basic backup to adopt a cyber-ready approach, including topics like immutability, threat awareness, rapid recovery, and intelligent automation.

Our focus will be practical and grounded in real-world scenarios, and what truly works when pressure is high and time is limited. Because when every minute counts and trust is at stake, data resilience means more than surviving an attack. It’s about protecting what matters most and emerging even stronger.

Topics: Business Continuity / Disaster Recovery, Data Management, Information Security
12:00 - 12:50 PM

[1 CPE] From Assessment to Implementation: Inside a Live CMMC Journey

  Presented by Matt Palguta, Cybersecurity Director • Bering Straits Native Corporation

The Department of War’s CMMC program has lifted off for Stage One. This session will feature updates on the program from a CMMC Lead Assessor who will be wrapping up his own program assessment just before the conference with Bering Straits. Listen in on lessons learned from assessing and guiding other organizations while building a CMMC program. The final rule brought clarity and some new wrinkles. Not all of your OS crypto modules have yet to pass FIPS Validation... Hmm, is that an Enduring Exception or an Operational Plan of Action? What are those? There will be time for questions at the end, and Matt will be available to answer additional questions after the session as well.

Matt Palguta has 20+ years of cybersecurity experience in government contracting and manufacturing. As Cybersecurity Director for Bering Straits Native Corporation, he has built their CMMC compliance program to be certified and support future compliance needs beyond CUI data. Matt’s experience includes building a security operations center for the FAA and managing global cybersecurity operations for Cummins Diesel. He teaches as an adjunct professor of cybersecurity with Ivy Tech. Matt is also the founder and CEO of Alyeska Cybersecurity LLC, a CMMC and industrial control system consultancy.

Topics: Data Management, Information Security
1:00 - 1:50 PM

[1 CPE] From Latency to Local: Rethinking Network Design in Alaska

  Presented by CompuNet

With the arrival of a local Cato PoP, Alaska is no longer at the edge of the network—it’s becoming part of the core. This session explores what that shift means for performance, security, and the future of cloud adoption across the region

Topics: Infrastructure
2:00 - 2:50 PM

[1 CPE] The Enterprise Buyer’s Guide to AI Security Platforms

  Presented by Cato Networks

AI adoption is accelerating faster than security and governance, exposing organizations as sensitive data flows through copilots, LLM-powered apps, and agentic systems that legacy tools can’t properly protect. With a surge of AI security vendors entering the market, buying the right platform can be confusing. This presentation helps security leaders evaluate AI security solutions by clarifying the new risks AI creates, explaining the core pillars of AI security, and outlining how to compare platforms, ask the right questions, and avoid common buying mistakes.

Topics: Artificial Intelligence
  • Sessions
9:00 - 9:50 AM

[1 CPE] From Liability to Asset: Securing Unstructured Data at Scale in the Era of AI

  Presented by Rubrik

Unstructured data is the lifeblood of the modern organization, yet its sheer volume often outpaces the strategies meant to protect it. As this data becomes the fuel for future AI initiatives and business intelligence, the "old way" of managing NAS has become a primary point of failure.

In this session, we’ll dive into how Rubrik NAS Cloud Direct (NCD) redefines the protection of PB-scale file systems. We will explore a modern architectural approach that provides the speed, visibility, and cloud-native flexibility required to turn massive data sets into resilient assets. Whether you are preparing for an AI-driven future or simply struggling with the growth of your current footprint, this session will provide a blueprint for total unstructured data control.

Topics: Artificial Intelligence, Data Management
10:00 - 10:50 AM

[1 CPE] AI-Native Networking: From Reactive IT to Autonomous Operations

  Presented by HPE Networking

Traditional networks were designed for human troubleshooting. As environments scale and expectations rise, reactive operations and manual workflows no longer meet the needs of modern enterprises.

AI-Native Networking represents a fundamental architectural shift — where AI is not layered on top of infrastructure, but built into its foundation. By combining real-time telemetry, cloud-native microservices, and continuously trained models, AI-Native platforms move IT from reactive firefighting to autonomous operations.

The result: measurable improvements in user experience, reduced operational overhead, faster root-cause resolution, and infrastructure that continuously optimizes itself.

This session explores what it truly means to be AI-native, how it differs from legacy “AI-enhanced” approaches, and the business outcomes organizations are achieving by embracing this new model.

11:00 - 11:50 AM

[1 CPE] Cybersecurity and Compliance For 2026

  Presented by Structured

This session examines how organizations can align cybersecurity, privacy, and compliance programs with the realities of 2026. The presentation reviews current threat trends, executive accountability requirements, and the expanding impact of artificial intelligence on risk management. It then connects federal, state, and industry obligations, including NIST CSF 2.0, HIPAA, CJIS, PCI DSS 4.0, CMMC, and emerging privacy laws to practical security program design. Attendees will leave with a clear framework for building a complete security program that integrates governance, segmentation, risk management, Zero Trust principles, and penetration testing to reduce risk and support regulatory readiness.

Topics: Information Security
12:00 - 12:50 PM

[1 CPE] Capture the Flag: A Hands-On Threat-Hunting Workshop

  Presented by Carmie Mach, Cortex Domain Consultant • Palo Alto Networks

Sharpen your incident response and digital forensics skills at INTERFACE Anchorage 2026. Tackle real-world cybersecurity challenges and expand your expertise through a hands-on exercise at the Palo Alto Networks SecOps Capture the Flag competition event. How quickly can you investigate the threat at hand?

Join Carmie Mach of Palo Alto Networks for an interactive Capture the Flag (CTF) workshop designed to sharpen your real-world security skills. Participants will tackle hands-on challenges across areas like network defense, threat detection, and vulnerability analysis in a guided, collaborative environment. Whether you're new to CTFs or looking to level up, this session offers practical experience you can immediately apply in your day-to-day cybersecurity work.

1:00 - 1:50 PM

[1 CPE] The AI Mutiny: Regaining Control of the Unauthorized Intelligence Explosion

  Presented by Palo Alto Networks

Your employees are already using AI—the only question is whether you’re invited to the party. Statistics show that nearly 60% of the workforce has bypassed IT to use AI tools, leading to a surge in data exposure and breach incidents. The "Shadow" has returned, and it’s smarter than ever. Join us for a look at the reality of Shadow AI in the enterprise. We’ll analyze real-world breach scenarios and provide a roadmap for reclaiming control. Learn how to empower your workforce with approved, secure AI alternatives that satisfy the need for speed without sacrificing security.

Topics: Artificial Intelligence, Information Security
2:00 - 2:50 PM

[1 CPE] Industry Leading Alternatives to VMware and other Legacy Hypervisors

  Presented by Scale Computing

As organizations modernize their IT environments, many are exploring alternatives to traditional hypervisor platforms. Hyperconverged infrastructure (HCI) integrates compute, storage, and virtualization into a unified platform designed to simplify deployment, scaling, and management. This session will examine how these architectures can improve resilience, reduce operational complexity, and support both core data center and edge environments.

We’ll look closely at hyperconverged and edge computing solutions designed to make IT infrastructure simple, scalable, and highly available for organizations of all sizes and verticals –– integrating servers, storage, and virtualization into a single, easy-to-manage solution.

Topics: Infrastructure
  • Sessions
9:00 - 9:50 AM

[1 CPE] Observations from the Front Lines: The People Behind the Threats and Trends

  Presented by Peter Ingebrigtsen, Sr Technical Marketing Manager • Arctic Wolf

Cybersecurity threats don’t emerge in isolation—they are observed, analyzed, and stopped by real people working on the front lines every day. This session pulls back the curtain on modern security operations, focusing on the human-driven research that powers effective threat detection, incident response, and adaptive security strategies.

Drawing on Arctic Wolf Labs research, SOC analyst expertise, and real-world incident data, this talk examines how today’s attacks are identified, contextualized, and disrupted in live environments. Attendees will gain insight into the patterns behind the most persistent threats, how adversaries continually adapt, and why defenders must evolve just as quickly. Rather than focusing solely on tools or alerts, this session highlights the people, processes, and intelligence that transform raw telemetry into actionable defense - illustrating how to turn frontline observations into scalable protection for organizations of all sizes.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Rethinking Fire Suppression in Mission Critical Facilities

  Presented by Jeff De Hart, Director of Data Center Vertical Development • Kidde Fire Systems

As data centers continue to scale in size and complexity, traditional fire suppression approaches are being challenged to keep pace. In this session, Jeff De Hart, Director of Data Center Vertical Development at Kidde Fire Systems, draws on nearly three decades of experience to explore modern strategies for protecting mission-critical environments. Attendees will learn how simplified system design can reduce hardware requirements, lower installation and recharge costs, and deliver continuous protection across the data hall—without compromising safety or resilience.

Jeff leads the hyperscale data center and BESS strategy across the United States and Canada, is a recognized authority in special-hazard and clean-agent solutions for mission-critical environments, and serves on the Fire Suppression Systems Association (FSSA) Technical Committee.

Topics: Data Center Technology
11:00 - 11:50 AM

[1 CPE] Seamless Hybrid Connectivity: Leveraging Cellular (5G) and LEO

  Presented by Ericsson

In an era of digital transformation, enterprises need agile, secure, and reliable connectivity that overcomes the limitations of terrestrial networks. This presentation shows how Wireless WAN edge routers, cloud management platforms, through Public/Private/LEO options unlocks the full potential of WAN Connectivity. Attendees will learn how to deploy Wireless WAN for fast primary, Day-1 Internet, WAN redundancy, IoT and In-Vehicle applications. Extending seamless coverage with private 5G for challenging indoor/outdoor environments and apply zero-trust security through simplified SASE to protect against growing threats.

Through real-world examples, discover how these solutions enable rapid deployment at distributed sites, vehicles, IoT ecosystems, and pop-up locations—driving better performance, operational efficiency, enhanced mobility, and business growth without infrastructure constraints. Leave equipped to harness 5G/Hybrid Connectivity for innovation and scalability anywhere.

Topics: Infrastructure
1:00 - 1:50 PM

[1 CPE] vDilemma: Sobering Realities of the Virt Market

  Presented by Matthew Webb, Virtualization SME • Everpure, formerly Pure Storage

With nearly two and a half years of Broadcom ownership of VMware, the market has fragmented in ways many people did not expect. Come to be part of an open community conversation that discusses the reality of licensing changes and the options many customers are considering.

Topics: Infrastructure
2:00 - 2:50 PM

[1 CPE] Ransomware Resilience: Navigating Threats in a Hybrid-Cloud World

  Presented by Ken Smallwood, Systems Engineer, Data Services and Storage • HPE

This presentation explores how organizations are navigating rising cyber threats, evolving workloads, and stricter regulations while managing legacy environments. We will discuss the growing risk of ransomware, fragmented data across cloud and edge, and the need for unified, resilient data protection strategies.

Topics: Business Continuity / Disaster Recovery

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Darrell Aldridge
Advanced Computer Technician
Medical Network of Alaska

Rob Barnett
Director, IT Business Integration
Natives of Kodiak

Dan Ezell
Manager, Cybersecurity Engineering
AK Office of Information Technology

Beth Fleischer
Director, Information Technology
Alaska Railroad Corporation

Dana Gonderzik
Director, Information Security
Global Credit Union

Brad Heaston
Manager, Data Center, Systems
Alaska Native Tribal Health Consortium

Chris Javier
Director, Technology
Galena City School District

Ryan Krause
Director, Information Technology
Rasmuson Foundation

Ryan McDaniel
Chief Information Officer
University of Alaska Anchorage

Wes McEwen
Statewide Helpdesk Manager
AK Division of Administrative Services

Mark Merchant
Information Security Engineer
South Central Foundation

Sean Meyn
SVP, Risk Officer
Mt. McKinley Bank

Justin Michaud
Sr Manager, Business & Operations
Mat-Su Borough School District

Dan Monarch
Chief Information Security Officer
State of Alaska

Janelle Mullen
Manager, Information Technology
AK Dept of Health

Aaron Mute
Director, Information Technology
Association of Village Council Presidents

Brian Noonan
Systems Engineer
Alaska Railroad Corporation

Stephen Phillips
Chief Technology Officer
Cordova Telephone Cooperative

David Reed
Manager, Information Systems Security
Motorola Solutions

Jon Rendulic
Chief Information Security Officer
Municipality of Anchorage

Thor Ryan
Chief Risk Officer
AK Dept of Revenue

Mischaud Scruggs
Manager, Information Technology
Assets, Inc.

Amos Secoy
Director, Campus Technology Services
University of Alaska Anchorage

Benjamin Shier
Chief Information Technology Officer
University of Alaska Anchorage

Tim Shoemaker Sr.
Manager, Information Technology
General Dynamics Information Technology

Bill Smith
Chief Information Officer
State of Alaska

Andrew Spath
Chief of Operations IT Customer Services
AK Dept of Family and Community Service

Jerry Tibor
Manager, LAN
University of Alaska Anchorage

David Vanzant
SVP, Enterprise Security
Global Credit Union

Hutch White
Information Systems Security Officer
South Central Foundation

Eric Wren
Manager, Information Security Infrastructure
Chugach Electric

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
BIG

BIG

BIG
Want to see your business grow but not sure where to start? Reach new heights with world-class business consulting from Business Improvement Group.
Visit Website
Cato Networks

Cato Networks

Cato Networks
Cato provides the world’s most robust single-vendor SASE platform, converging Cato SD-WAN and a cloud-native security service edge, Cato SSE 360, into a global cloud service. Cato SASE Cloud optimizes and secures application access for all users and locations everywhere.
Visit Website
CompuNet

CompuNet

CompuNet
CompuNet is a leading U.S. information technology partner, headquartered in Boise, Idaho. The firm specializes in consultation, design and implementation services specifically tailored to solve business problems. With a best-in-class engineering staff and approach, CompuNet focuses on building lasting relationships that prioritize client satisfaction over sales through every step of the journey.
Visit Website
CTG

CTG

CTG
CTG is a leading provider of IT solutions and services, serving as a catalyst for our clients’ digital transformation. We accelerate their project momentum and achievement of desired technology and business outcomes with agility and confidence.
Visit Website
Ericsson

Ericsson

Ericsson
Ericsson’s enterprise wireless solutions enable organizations to innovate, operate, and grow anywhere — without constraints. Ericsson NetCloud, Cradlepoint routers, and Enterprise 5G solutions provide the flexibility of public and private 5G, with the zero trust security of simplified SASE.
Visit Website
Everpure

Everpure

Everpure
Create an Enterprise Data Cloud that unifies access, simplifies management, and unlocks the value of your data—only with the Everpure platform.
Visit Website
FRSecure

FRSecure

FRSecure
FRSecure applies industry standards to assess existing information security programs (administrative, physical and technical security controls), and we develop, implement and manage information security programs tailored to each client’s specific security needs.
Visit Website
Horizon3.ai

Horizon3.ai

Horizon3.ai
Horizon3.ai enables organizations to continuously assess the security posture of their enterprise across many attack surfaces.
Visit Website
HPE

HPE

HPE
At Hewlett Packard Enterprise, we aim to be the industry’s leading provider of hybrid IT, built on the secure, next-generation, software-defined infrastructure that will run customers’ data centers today, bridge them to multi-cloud environments tomorrow, and power the emerging intelligent edge that will run campus, branch and Industrial IoT applications for decades to come. All delivered through a world class services capability.
Visit Website
ImageSource

ImageSource

ImageSource
ImageSource is a software and systems integration firm specializing in Enterprise Content Management.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website
Scale Computing

Scale Computing

Scale Computing
Scale Computing's highly-automated edge infrastructure, virtualization platform, & hyperconverged solutions can handle all of your IT infrastructure needs.
Visit Website
Semperis

Semperis

Semperis
Semperis is the industry's most comprehensive Active Directory security and recovery platform, protecting hybrid AD environments from identity-based attacks.
Visit Website
Thales

Thales

Thales
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website
Yukon Fire Protection

Yukon Fire Protection

Yukon Fire Protection
Yukon Fire Protection has been reliably serving Alaskans since 1978! From inspecting your fire extinguisher to designing an automatic fire suppression system, our experienced team of engineers and technicians are ready to help you with your fire protection needs.
Visit Website

BRONZE SPONSORS

Abnormal

Abnormal

Abnormal
The Abnormal Behavior Platform uses superhuman understanding of human behavior to protect against phishing, social engineering, and account takeovers.
Visit Website
BlueVoyant

BlueVoyant

BlueVoyant
Founded in 2017, BlueVoyant® aims to address pressing cybersecurity challenges for companies and government entities, leveraging years of experience in building defense capabilities for critical organizations.
Visit Website
Cyera

Cyera

Cyera
Cyera is the AI Security Platform built for the age of agents. Enterprises like Paramount, Chipotle, and Valvoline use Cyera to control exactly what data their AI can reach—and govern what happens next. The platform secures data at rest, in motion, and in use, whether touched by humans or AI agents. Valued at $9 billion and backed by over $1.7 billion from top-tier investors including Accel, Blackstone, and Sequoia. Protect your data. Secure AI.
Visit Website
Expel

Expel

Expel
Expel is a recognized, leading managed detection and response (MDR) provider offering transparent service and a 17-minute MTTR on high/critical incidents.
Visit Website
Halcyon

Halcyon

Halcyon
Halcyon formed in 2021 by a team of cybersecurity industry veterans after battling the scourge of ransomware (and advanced threats) for years, at some of the largest global security vendors. Halcyon is focused on building products and solutions for mid-market and enterprise customers.
Visit Website
Netskope

Netskope

Netskope
Netskope, a global SASE leader, helps organizations apply zero trust principles and AI/ML innovations to protect data and defend against cyber threats. The Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Learn how Netskope helps customers be ready for anything on their SASE journey, visit netskope.com.
Visit Website
Pentaho

Pentaho

Pentaho
Pentaho powers seamless integration, governed pipelines, real-time insights, and built-in compliance—so you can activate AI faster and move ahead with confidence.
Visit Website
Sublime Security

Sublime Security

Sublime Security
Sublime is the new standard for email security. The adaptive, AI-powered email security platform that combines best-in-class effectiveness with visibility and control. Not just another black box, our AI-powered detection engine detects and prevents email attacks, so security teams can spend less time on email-originated incidents.
Visit Website
ThreatLocker

ThreatLocker

ThreatLocker
A Zero Trust cybersecurity solutions platform, ThreatLocker delivers world-class enterprise security software and solutions worldwide.
Visit Website
Zafran Security

Zafran Security

Zafran Security
Zafran is an AI-native exposure management platform that eliminates the manual toil of vulnerability management by cutting through noise, revealing what is truly exploitable, and automating mitigation and remediation using the security controls teams already have.
Visit Website

EXHIBITORS & ASSOCIATIONS

AHEAD

AHEAD

AHEAD
Founded in 2007, AHEAD grew up in the data center and retains its deep infrastructure expertise at the core of its business. But as the market has changed, the company has always invested ahead of the curve. With strategic consulting and managed services, along with innovation in practices like cloud, security, and data, AHEAD has become a key partner for countless enterprises in their path to digital business transformation.
Visit Website
AK Office of Information Technology

AK Office of Information Technology

AK Office of Information Technology
The Office of Information Technology provides enterprise IT solutions to the State of Alaska. Our vision: One Government, empowered by innovative technical collaboration. Our aim: Reduce complexity, improve efficiency, and encourage creativity in order to securely provide better government services to all Alaskans.
Visit Website
Arctic IT

Arctic IT

Arctic IT
Arctic IT is a local managed services provider and business applications implementation partner located in Anchorage. We are a proud member of the Doyon, Limited family of companies. As a Microsoft Solutions Partner, our focus is to deliver innovative, secure cloud workplace solutions for our clients. Since 2002, we’ve helped government, tribal, and commercial organizations improve service delivery and streamline operations.
Visit Website
Armis

Armis

Armis
Armis is the global leader in cyber asset security. Fortune 500 companies trust our real-time, comprehensive asset intelligence to deliver full visibility and automated enforcement across every connected asset and environment. Armis helps organizations across any industry continuously secure their entire cyber-asset attack surface.
Visit Website
Barracuda

Barracuda

Barracuda
Barracuda Networks is the worldwide leader in Security, Application Delivery and Data Protection Solutions. More than 200,000 global customers trust Barracuda to safeguard their employees, data, and applications from a wide range of threats. Barracuda provides easy, comprehensive and affordable solutions for email protection, application protection, network protection and data protection. We are continually innovating to deliver tomorrow’s security technology, today.
Visit Website
CISA

CISA

CISA
CISA is the Nation’s risk advisor, working with partners to defend against today’s threats and collaborating to build more secure and resilient infrastructure for the future.
Visit Website
Cisco

Cisco

Cisco
Cisco is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. Cisco delivers intelligent cybersecurity for the real world.
Visit Website
Cohesity

Cohesity

Cohesity
Cohesity delivers a web-scale platform that simplifies data protection, consolidates file and object services, provides instant access to test/dev copies, spans from the edge to the cloud, and performs in-place searches and analytics.
Visit Website
CrowdStrike

CrowdStrike

CrowdStrike
CrowdStrike® provides cloud-delivered endpoint and workload protection. Leveraging artificial intelligence (AI), the CrowdStrike Falcon® platform protects customers against cyberattacks on endpoints and workloads on or off the network by offering visibility and protection across the enterprise.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
Dell

Dell

Dell
Dell Technologies (NYSE:DELL) helps organizations and individuals build their digital future and transform how they work, live and play. The company provides customers with the industry’s broadest and most innovative technology and services portfolio for the data era.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet helps organizations across the public and private sectors protect the systems, data, and services that keep businesses and communities running. From government agencies and schools to enterprises and service providers, leaders rely on Fortinet to secure critical infrastructure, ensure operational continuity, and defend against evolving cyber threats. Our Security Fabric platform unifies networking and security to deliver the visibility, control, and efficiency organizations need to operate confidently, whether virtual, in the cloud, or on-premises.
Visit Website
GCSIT

GCSIT

GCSIT
GCSIT is a different kind of engineering firm. We act as your personal technology optimization team to create and maintain custom-built, agile infrastructure. We help you transition to the right technology solutions to better handle complex and dynamic challenges.
Visit Website
HPE

HPE

HPE
At Hewlett Packard Enterprise, we aim to be the industry’s leading provider of hybrid IT, built on the secure, next-generation, software-defined infrastructure that will run customers’ data centers today, bridge them to multi-cloud environments tomorrow, and power the emerging intelligent edge that will run campus, branch and Industrial IoT applications for decades to come. All delivered through a world class services capability.
Visit Website
ICE Services

ICE Services

ICE Services
ICE Services, Inc.’s ICT Division provides practical, reliable technology solutions that support modern facilities and operations. Our team is focused on delivering long-term value by designing and deploying systems built on industry-recognized technology platforms and supporting our work with extended warranty options. Every project is performed by certified professionals with deep experience in the technologies we design, install, and commission, ensuring dependable systems that are built to last.
Visit Website
InfraGard Alaska

InfraGard Alaska

InfraGard Alaska
InfraGard is a partnership between the FBI and the private sector. It's an association of businesses,academic institutions,law enforcement agencies,and other participants dedicated who share information to prevent hostile acts against the U.S.
Visit Website
ISACA Anchorage

ISACA Anchorage

ISACA Anchorage
ISACA Anchorage is a local chapter of the international ISACA organization serving the Anchorage and Mat-Su areas. Our goal is to provide local IT audit, governance, and security professionals with the resources to the global ISACA organization.
Visit Website
Kelley Create

Kelley Create

Kelley Create
Our mission is to create strategic advantages designed to help our partners grow their businesses. We’ve built a team of in-house technology experts tasked to use a consultative approach to assess unique business needs and offer creative, tailor-made solutions. We specialize in cloud & IT services, security solutions, automation solutions, printing and sending solutions.
Visit Website
KiddeFenwal

KiddeFenwal

KiddeFenwal
KiddeFenwal is a global leader in fire detection, suppression, and control solutions, protecting critical environments such as data centers, power facilities, marine vessels, and commercial kitchens. Now an independent company backed by Pacific Avenue Capital Partners, KiddeFenwal combines a century of engineering expertise with a renewed focus on INSITES (Speed, Innovation, Teamwork, and Excellence) to safeguard lives, livelihoods, and assets.
Visit Website
Koniag Cyber

Koniag Cyber

Koniag Cyber
Enterprise cybersecurity solutions for highly regulated industries including government, healthcare, finance, and critical infrastructure. Specializing in assessment, prevention, detection, and response services.
Visit Website
LMJ Consulting

LMJ Consulting

LMJ Consulting
LMJ Consulting is an Alaskan based provider of CIO caliber managed IT services along with security and compliance.
Visit Website
MSPAA

MSPAA

MSPAA
The MSP Association of America (MSPAA) has been established with three primary missions, each of which follows a unique trajectory aimed at providing our clients, members, and students with a collaborative and informative pathway towards building a future for technology, business, and education.
Visit Website
Object First

Object First

Object First
Secure, simple, and powerful backup storage for Veeam that’s Absolutely Immutable. Third-party tested to be the ultimate ransomware defense, so every organization can be Simply Resilient.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website
Pentera

Pentera

Pentera
Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers including their ransomware readiness, unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. In 2020, Pentera was chosen by Gartner as a Cool Vendor in the Security Operations and Threat Intelligence report.
Visit Website
PMI Alaska

PMI Alaska

PMI Alaska
The PMI Alaska Chapter will be recognized as a dynamic organization of Professional Project Managers dedicated to serving the business and educational community of Alaska through the advancement of Project Management.
Visit Website
Qumulo

Qumulo

Qumulo
Qumulo, the leader in data-aware scale-out NAS, helps CIOs and storage administrators store, manage and curate enormous numbers of digital assets.
Visit Website
Rhombus

Rhombus

Rhombus
At Rhombus, relationships are at the heart of what we do. No matter how big or small your company is, our mission is to build a true partnership and provide simple smart, and powerful solutions that fit your unique security needs.
Visit Website
Sentinel Technologies

Sentinel Technologies

Sentinel Technologies
Sentinel Technologies proudly presents Fortis: a comprehensive portfolio of security services and solutions designed to proactively protect every aspect of your digital and physical environment.
Visit Website
TenSpire

TenSpire

TenSpire
AI inference API endpoints, GPU instances, and enterprise infrastructure. OpenAI-compatible API on open-weight models. Multi-vendor resilience without lock-in.
Visit Website
Vertiv

Vertiv

Vertiv
At Vertiv, We support today's growing mobile and cloud computing markets with our portfolio of power, thermal and infrastructure management products, software and solutions, all complemented by our global service network.
Visit Website
Xiologix

Xiologix

Xiologix
Xiologix is a technology solution provider of business driven multi-vendor IT solutions to customers throughout the US and Canada. They offer a wide variety of hardware and software products from the world's leading IT companies.
Visit Website

Interested in becoming part of this event?

CONTACT US FOR INFO

Anchorage

Dena’ina Convention Center
Tikahtnu Ballroom
600 W 7th Avenue
Anchorage, AK 99501

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.