F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Thank you to everyone who attended

INTERFACE Anchorage 2025

The Last Frontier's Premier Technology Event will return in 2026

INTERFACE Anchorage 2025

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Anchorage EVENTS

AT A GLANCE

April 17th, 2025
8:30am – 4:30pm

Dena’ina Convention Center
Tikahtnu Ballroom
600 W. 7th Avenue
Anchorage, AK 99501

Directions & Parking

Venue Accessibility

KEYNOTE: [1 CPE] The Power of Partnership

  Presented by Aaron Smith • Vice President of Information Technology at Doyon, Limited

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Theater Three
  • Theater Four
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Breaking Down Silos: Unify Assets, Minimize Attack Exposure

  Presented by Lucas Zaichkowsky, Sr Sales Engineer • Axonius

In today’s rapidly evolving security landscape, organizations face the challenge of managing a wide array of tools across endpoints, identities, and networks. While each tool serves a critical purpose, they often operate in isolation, creating silos that obscure visibility and expose vulnerabilities. This session will address how the fragmentation of security systems and data increases attack surfaces and how integrating a unified cyber asset management approach can significantly reduce attack exposure.

Join us as we explore how security professionals can move beyond disconnected tools to leverage a single, comprehensive view of their assets and threat exposures. We’ll highlight practical steps and present a preview of an end-to-end solution designed to break down silos, provide full cyber asset visibility, and enable a more holistic approach to minimizing security risks.

As technology continues to evolve, managing disparate security systems will remain a pressing challenge. This session will offer actionable insights to security professionals looking to streamline their approach and safeguard their organizations from the growing complexities of cyber threats.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] What the Hack is Going On?

  Presented by Tim Medin, Chief Executive Officer • Red Siege

A comprehensive overview of modern cybersecurity threats and how breaches occur. We will highlight the various methods used by cybercriminals, including phishing, social engineering, and ransomware attacks, and emphasize the importance of identifying and addressing vulnerabilities before they can be exploited. There are a lot of vulnerabilities in the wild, and IT administrators and security professionals often focus on the wrong issues because they are easier to monitor or measure. By the end of the presentation, you will have gained valuable insights into the latest cybersecurity threats and how to protect against them.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Navigating the Future of Data Center Hypervisors: Prepare for Disruption

  Presented by Steve Asmussen, Global Data Center Architect • CompuNet

Explore the latest trends in data center technology including hardware architectures, virtualization, and hypervisor platforms. This session will share insights into the options you have available to optimize your virtual data center infrastructure. It will also cover the impact of recent shifts from perpetual to subscription-based licensing.

Topics: Data Center Technology
1:00 - 1:50 PM

[1 CPE] Modern Data Demands Modern Storage: Unlocking Possibility

  Presented by Russell Pope, Solution Architect, Unstructured Data • Pure Storage

As organizations modernize their infrastructure to support cloud-native applications, AI/ML workloads, and ever-growing data volumes, traditional storage systems often become a bottleneck to innovation. In this session, we’ll introduce Pure Storage—a company purpose-built to meet the evolving demands of the modern data stack. We’ll explore how Pure’s unique architecture, API-driven approach, and evergreen model deliver consistent performance, scalability, and operational simplicity. Whether you’re managing mission-critical databases, enabling real-time analytics, or building AI pipelines, you’ll gain insight into how Pure’s solutions help you move faster, operate smarter, and future-proof your storage investments.

Topics: Infrastructure
2:00 - 2:50 PM

[1 CPE] Successfully Implementing AI in Your Office: An Interactive Discussion

  Presented by INTERFACE Advisory Council

With so many useful applications from customer service to data management and new employee recruiting, the use of Artificial Intelligence around workplaces increases every day. Information Technology professionals are now tasked with identifying AI tools to increase efficiency and find cost savings. Employees have been utilizing AI for task automation in a wide array of roles. This adoption is only going to continue to grow.

How is all this governed? What are the security practices you need to adhere to? Join us for an open panel discussion on the proper implementation of AI in your workplace. Our Advisory Council will share some of their experiences in utilizing AI applications of all types while ensuring the necessary security measures. Bring your questions to ensure you walk away with valuable insights for properly implementing AI.

Panelists:

  • Wes McEwen, Manager, IT Helpdesk, AK Dept of Commerce, Community & Economic Development
  • Brian Noonan, Director, Information Technology, Altman Rogers & Co.
  • Mischaud Scruggs, Manager, Information Technology, Assets, Inc.
  • Niel Smith, Deputy Chief Information Officer, State of Alaska
Topics: Artificial Intelligence, Strategic Management
Aaron SmithAaron SmithVice President of Information Technology at Doyon, Limited
3:00 - 3:50 PM

[1 CPE] The Power of Partnership

  Presented by Aaron Smith • Vice President of Information Technology at Doyon, Limited

Technology alone doesn’t drive success—partnerships do. True innovation happens when organizations work together, leveraging expertise, shared goals, and a commitment to collective growth. By fostering strong relationships, we build solutions that are more resilient, secure, and impactful for the future.

Join us as Aaron Smith, Vice President of Information Technology at Doyon, Limited, shares his experiences on achieving success through organizational alignment. While technology provides a wealth of tools, people and partnerships are essential to achieving goals.

Aaron Smith is the Vice President of Information Technology at Doyon, Limited and the President of InfraGard Alaska. With decades of experience in IT leadership, cybersecurity, and infrastructure protection, Aaron has worked extensively in both the private and public sectors to enhance security and operational resilience. His expertise spans critical infrastructure protection, risk management, and technology-driven business transformation.

Before joining Doyon, he served as Chief Information Officer for Doyon Utilities, overseeing technology operations supporting essential services across Alaska. Aaron also has a military background, having retired from the Alaska Air National Guard, where he focused primarily on cybersecurity and network defense.

Passionate about collaboration and innovation, he believes in the power of partnerships to drive meaningful technological advancements that protect and empower organizations. Over his 20+ year career, Aaron has worked across Information Technology, Supervisory Control and Data Acquisition (SCADA), and Cybersecurity in both military and civilian sectors.

Topics: Culture, Strategic Management
  • Sessions
9:00 - 9:50 AM

[1 CPE] How to Make AI a Reality in Your Organization

  Presented by Colton Rockwell, Lead Generation Marketing Manager • ImageSource

AI adoption is accelerating, yet many organizations struggle to transition AI projects from proof-of-concept to production. The AI Empowerment Blueprint is a structured framework that helps businesses overcome common AI adoption barriers, align AI initiatives with business goals, and implement a governance strategy that ensures ethical and effective AI deployment.

This session will guide attendees through a six-step methodology for AI success, covering key phases such as AI exploration, business value alignment, governance frameworks, and implementation best practices. Learn how to identify AI opportunities, mitigate risks, and build a scalable AI strategy that delivers real business value.

Whether you're an executive, technologist, or entrepreneur, this presentation will equip you with actionable insights and a proven roadmap to maximize AI's impact within your organization.

Topics: Artificial Intelligence, Data Management
10:00 - 10:50 AM

[1 CPE] Fortifying Enterprise Security: Advanced Cybersecurity Strategies for Today

  Presented by Elizabeth Schaedler, Security Strategist • Splunk a Cisco Company

In an era of escalating cyber threats, robust cybersecurity measures are vital to safeguarding sensitive data, critical systems, and enterprise networks. This presentation dives deep into the pivotal role of cybersecurity within information security (InfoSec), emphasizing the protection of confidentiality, integrity, and availability against sophisticated attacks like ransomware, phishing, and insider threats. IT operations and security professionals will explore cutting-edge tools and strategies—including firewalls, intrusion detection systems (IDS), encryption, multi-factor authentication (MFA), and incident response frameworks—that form the backbone of modern cyber defense.

The session will also address how cybersecurity drives enterprise risk management, empowering teams to identify vulnerabilities, enforce compliance, and ensure business continuity in the face of evolving risks. Expect practical, actionable insights to enhance your organization’s security posture, secure networks, and defend critical assets against today’s dynamic threat landscape. This is a must-attend for professionals tasked with staying ahead of cybercriminals and protecting their operations.

Topics: Business Continuity / Disaster Recovery, Information Security
11:00 - 11:50 AM

[1 CPE] Building a Secure Foundation: An Overview of Zero Trust and Fixed Wireless

  Presented by David Mathis, Sr Solutions Partner, and TJ Smith, Principal Manager, Solutions Architect for Connected Devices  • Verizon

The Zero Trust Framework is a model that shifts defenses from network perimeters to users, assets, and resources. It emphasizes verifying all entities before allowing network communication. Fixed Wireless Access is a technology that enables us to place the edge of our network anywhere that we need to do business. This presentation outlines how zero trust works, its importance, and how to build a zero trust infrastructure that allows us to build out our networks quickly, reliably, and securely.

Fixed Wireless Access (FWA) is a broadband technology that provides last-mile connectivity using wireless transmission between fixed points. Unlike traditional terrestrial or mobile wireless solutions. FWA offers High-Speed, reliable Internet connectivity, rapid deployment, and quick tear down, and is a flexible yet cost-effective alternative or augmentation to existing fiber or cable connections. Ensuring that these new connections still meet or exceed existing network requirements is key successful adoption of the technology.

Topics: Data Management, Information Security
12:00 - 12:50 PM

[1 CPE] Mitigating the Risk of AI in the Corporate Environment

  Presented by Teresa Rule, President, RNT Cyber Academy, Member • ISACA Anchorage

In the corporate environment, mitigating the risks associated with artificial intelligence (AI) is crucial for ensuring operational resilience and strategic growth. AI, while offering unparalleled benefits in risk management through predictive analytics and real-time monitoring, also introduces new challenges such as data breaches, algorithmic bias, and cybersecurity threats. To effectively manage these risks, organizations must adopt a systematic approach. This includes identifying areas of risk, such as financial, operational, and cybersecurity vulnerabilities, and evaluating data quality to support AI implementation. Choosing the right AI technology and training AI algorithms with historical data are also essential steps. Furthermore, integrating AI into existing processes and continuously evaluating its performance are vital for refining risk mitigation strategies. By leveraging frameworks like the NIST AI Risk Management Framework and engaging in proactive threat assessments, businesses can ensure that AI enhances their risk management capabilities while minimizing its inherent risks. Ultimately, a well-managed AI strategy can transform traditional risk assessment, enhance decision-making, and foster a secure and efficient corporate environment.

Topics: Artificial Intelligence
1:00 - 1:50 PM

[1 CPE] AI for IT Project Management: Tools, Techniques, and Use Cases

  Presented by Jim Bates, Founder, President & CEO  • Business Improvement Group

Discover how Artificial Intelligence (AI) is being used to transform IT Project Management approaches and how it can impact our IT project effectiveness and efficiency. We will explore trends and separate the hype from reality. We will discuss tools and techniques and demonstrate how we use AI to save time and more accurately predict and control our project outcomes, manage risk, and support transparent and defensible project governance.

Topics: Artificial Intelligence
2:00 - 2:50 PM

[1 CPE] Into the Future: A Virtual Tour of Palo Alto Networks’ SOC

  Presented by Devin Johnstone, Security Operations Consultant • Palo Alto Networks

Security leaders everywhere are asking the same question: how can I future-proof my cybersecurity strategy with less resources? Automation and AI are already within your reach! Learn how Palo Alto Networks is protecting itself and its customers and how you can take advantage of the same tools and strategies today.

Devin has spent over a decade in the trenches of a Security Operations Center and is passionate about sharing his lived experience in building a successful SecOps team from the ground up. 8 years ago, he joined Palo Alto Networks to begin architecting the internal SOC and went on to lead the development of the Security Automation, Data Loss Prevention, Insider Risk, and Customer Outreach programs.

Devin has had the opportunity to advise thousands of security teams, big and small, in their security operations journeys through media, tours of Palo Alto Networks SOC facility, and at events in 7 countries. He has since moved into a Consultant role to help customers accelerate their realization of "the art of the possible": AI-enabled security operations strategies prepared for whatever the future brings.

Topics: Artificial Intelligence, Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] AI in Cybersecurity: Navigating the New Frontier of Cyber Defense

  Presented by Devin Johnstone, Security Operations Consultant • Palo Alto Networks

In an era where cyber threats are becoming increasingly sophisticated, traditional security measures are often insufficient. Devin Johnstone, Security Operations Domain Consultant at Palo Alto Networks with vast experience in network security, threat intelligence, and cloud security will delve into the transformative role of Artificial Intelligence (AI) in modern cybersecurity. Attendees will gain insights into how AI enhances threat detection, enables proactive defense strategies, and addresses the evolving landscape of cyber threats. The discussion will also cover the benefits and challenges associated with integrating AI into cybersecurity frameworks, providing a comprehensive overview of how AI is shaping the future of cyber defense.

Devin has spent over a decade in the trenches of a Security Operations Center and is passionate about sharing his lived experience in building a successful SecOps team from the ground up. 8 years ago, he joined Palo Alto Networks to begin architecting the internal SOC and went on to lead the development of the Security Automation, Data Loss Prevention, Insider Risk, and Customer Outreach programs.

Devin has had the opportunity to advise thousands of security teams, big and small, in their security operations journeys through media, tours of Palo Alto Networks SOC facility, and at events in 7 countries. He has since moved into a Consultant role to help customers accelerate their realization of "the art of the possible": AI-enabled security operations strategies prepared for whatever the future brings.

Topics: Artificial Intelligence, Information Security
10:00 - 10:50 AM

[1 CPE] Cybersecurity and Compliance For 2025

  Presented by Rob Wayt, Director of Governance, Risk, and Compliance • Structured

The cybersecurity regulatory compliance landscape has never been more complicated, and this presentation will provide information and updates to CMMC, GLBA, PCI, TSA, generative AI, and security best practices. Presented by Rob Wayt, Director of Governance, Risk, and Compliance at Structured, this discussion will focus on security solutions to these challenges, including penetration testing and zero-trust implementations.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] AI-Backed Cybersecurity Threats Require AI-Backed Solutions

  Presented by Chris Blanding, Public Sector Security Sales Specialist • Juniper Networks

Context: Supported by AI, cybersecurity threat actors are accelerating both the speed and breadth of attacks. Every indicator, from increasing click rates on phishing emails to shrinking attacker breakout times suggests a sea change in the threat landscape. Consequently, integration and AI/ML-backed automation across a layered cybersecurity stack is more important than ever. Historically, cybersecurity solutions were developed to address specific threats. Consequently, as the number and diversity of threats grew the number and complexity of cybersecurity solutions in the system enterprise also grew, driving complexity, slowing response times, and ultimately reducing efficacy. SIEM, SOAR, and XDR platforms were developed to visualize cybersecurity telemetry across the system enterprise, investigate, and respond to threats. While these solutions greatly improved visibility and response they are unable to respond quickly and efficiently enough to stop AI-backed threats.

Approach: In addition to the broad adoption of layered security services providing visibility across the system enterprise, the solution is to leverage a strategically integrated, AI/ML-backed, enterprise security stack that accelerates detection and automates response.

Implications: While an integrated, AI-backed enterprise security stack will allow enterprises to stay ahead of cyber risk the impact on the system enterprise is far greater. By integrating security into the broad enterprise stack, you will mature network, application, and data visibility creating opportunities for more granular, targeted SLAs that ultimately impact uptime, quality of service, flexibility and speed. That makes businesses more competitive and public entities more responsive to citizens.

Topics: Artificial Intelligence, Information Security
12:00 - 12:50 PM

[1 CPE] Modern Security: Quantum Computing, AI, and External Key Management in the Cloud

  Presented by Thales

In this presentation, we will explore the emerging data threats posed by quantum computing and artificial intelligence and discuss their implications for data security. We will also delve into the advantages of external key management for cloud data, examining various strategies for protection, including encryption.

Join us to gain insights into the latest advancements in data security and learn how to safeguard your data against evolving threats.

Topics: Artificial Intelligence, Information Security
1:00 - 1:50 PM

[1 CPE] Security First AI-Powered Networking

  Presented by Jim Galiardi, System Engineering Manager • HPE Aruba Networking

Innovations in network visibility and telemetry now allow the network to be more than just plumbing. By actively participating in your zero-trust strategy the network can now offer additional insights and methods to protect users and data on and off the network. AI/ML will be the key to managing the wealth of telemetry now available, dynamically applying policy, and the beginnings of self-aware/self-healing networks.

Topics: Artificial Intelligence, Information Security
2:00 - 2:50 PM

[1 CPE] How SASE Will Deliver Efficient and Cost-Effective Outcomes

  Presented by Johan Dupuis-Lund, Account Manager and Santhosh Suresh, Solutions Architect • Cato Networks

Secure Access Service Edge (SASE) is transforming networking and security by eliminating the complexity and costs of fragmented infrastructure. With SASE, organizations can eliminate the effort and costs required to maintain complex and fragmented infrastructure made of point solutions. Join Converge and Cato Networks as we explore how a strong SASE strategy drives business outcomes while reinforcing zero-trust security. This will be an informational and interactive presentation, including a brief demo of Cato’s SASE solution.

Topics: Infrastructure
  • Sessions
9:00 - 9:50 AM

[1 CPE] Restoration in 72 Hours, Not 72 Days: Building Cyber Resilience in Healthcare

  Presented by James Cramer, PNW Healthcare GTM Lead • Rubrik

A singular focus on prevention and security is proving necessary but not sufficient to ensure continuity of operations and quality care. In an era of increasing cyberattacks, understanding the foundational principles of cyber resilience is essential for safeguarding patient data, ensuring organizational resilience, and ultimately, upholding patient care standards.

This session will explore the core concepts of cyber resilience and how they enable rapid recovery following cyber-attacks. With a focus on quantifying the impacts to operational downtime, legal costs and regulatory fines, as well as reputational damage, this discussion is tailored to help C-suite leaders prioritize cyber resilience strategies.

  • Explore the fundamental principles of cyber resilience, focusing on preserving continuity of care and business operations.
  • Assess the financial and operational risks of data breaches and ransomware attacks, including real-world examples from healthcare.
  • Discuss how to communicate the value of and build support for cyber resilience initiatives.
Topics: Data Management, Information Security
10:00 - 10:50 AM

[1 CPE] Pragmatic AI: Moving from Aspirations to Operations to Outcomes

  Presented by Seth Crosby, Principal Architect • GCSIT

Ready to cut through the AI hype? Join us for a no-nonsense guide to making AI actually work for your business. We'll map today's real AI capabilities (not the social-network demos), show you practical entry points whether you're just starting or ready to scale, and reveal the essential ingredients for successfully managing AI projects without drowning in complexity. Most importantly, you'll learn how to deliver and measure genuine business value through smart pilot programs without budgetary surprises. This session transforms intimidating AI concepts into actionable plans with tangible results—because impressive demos are nice, but outcomes are what really matter.

What You'll Learn:

  • How to apply a pragmatic framework to assess your AI control and develop a personalized adoption strategy
  • Techniques to identify AI opportunities that enhance your specific professional expertise
  • Methods to overcome resistance to change
  • Strategies to maintain your position as the "intelligence director" while leveraging AI as your thought assistant"
  • Practical approaches to deliver and measure genuine business value through smart, budget-conscious initiatives

This session is ideal for IT professionals and leadership in small to mid-market businesses looking for a pragmatic pathway to AI competency.

Topics: Artificial Intelligence, Data Center Technology, Information Security
11:00 - 11:50 AM

[1 CPE] Don’t Build a Fire Department

  Presented by Matt Martin, Sr Sales Engineer, Large Enterprise • Arctic Wolf

Building and maintaining an internal SOC operation is hard. We’ll discuss why it’s imperative that organizations lean on 3rd party partners to provide 24x7 monitoring across your collective attack surfaces.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Achieving Ransomware Resilience and Disaster Recovery in a Multi-Cloud World

  Presented by Ken Smallwood, Systems Engineer • Zerto

Discover how to achieve an always-on 24/7 business, ensuring that customers and stakeholders can expect uninterrupted access to their data and applications. Learn how to solve for Ransomware Resilience, Disaster Recovery, and Multi-Cloud mobility for virtualized environments, with continuous data protection (CDP) for any app, any cloud, and any threat. With the right solutions in place, your organization can seamlessly protect critical data and applications, mitigate the risk of ransomware attacks, and maintain business continuity.

Explore strategies for achieving ransomware resilience, automated disaster recovery planning and testing, and flexible hybrid-cloud capabilities that allow you to move applications and scale capacity on demand. By integrating comprehensive data protection measures, you can ensure compliance with regulatory mandates and provide robust resilience against evolving cyber threats. This approach empowers your IT team to focus on strategic initiatives by reducing the burden of manual recovery processes and ensuring rapid restoration of operations.

Topics: Business Continuity / Disaster Recovery, Information Security
2:00 - 2:50 PM

[1 CPE] Data Resilience to Keep Every Business Running

  Presented by Joshua Sasser, Senior Systems Engineer • Veeam

Every business should be able to bounce forward after a disruption with the confidence and control of all their data whenever and wherever they need it. We call this radical resilience, and we’re obsessed with creating innovative ways to help businesses achieve it. Join this session to learn how you can achieve data resilience with data backup, data recovery, data freedom, data security, and data intelligence across all environments.

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Darrell Aldridge
Advanced Computer Technician
Medical Network of Alaska

Rob Barnett
Director, IT Business Integration
Natives of Kodiak

Brad Davis
Manager, IT Procurement
Chenega Corporation

Dana Gonderzik
Manager, Information Security
Global Credit Union

Brad Heaston
Manager, Data Center, Systems
Alaska Native Tribal Health Consortium

Chris Javier
Director, Technology
Galena City School District

Wes McEwen
Statewide Manager, Helpdesk, IT
AK Division of Administrative Services

Mark Merchant
Information Security Engineer
South Central Foundation

Sean Meyn
SVP, Risk Officer
Mt. McKinley Bank

Justin Michaud
Sr Manager, Business & Operations
Mat-Su Borough School District

Dan Monarch
Chief Information Security Officer
State of Alaska

Janelle Mullen
Chief of Operations for IT Customer Services
AK Dept of Health

Aaron Mute
Director, Information Technology
Association of Village Council Presidents

Brian Noonan
Director, Information Technology
Altman Rogers & Co.

Stephen Phillips
Chief Technology Officer
Cordova Telephone Cooperative

Thor Ryan
Chief Risk Officer
AK Dept of Revenue

Bronn Salmon
Chief Information Officer
Sunshine Community Health Center

Chris Samuelson
Chief Information Officer
AVCP Regional Housing Authority

Mischaud Scruggs
Manager, Information Technology
Assets, Inc.

Amos Secoy
Director, Campus Technology Services
University of Alaska Anchorage

Tamara Serr
Director, Information Services & Cybersecurity
Central Peninsula Hospital

Benjamin Shier
Chief Information Technology Officer
University of Alaska Anchorage

Tim Shoemaker Sr.
Manager, Information Technology
General Dynamics Information Technology

Bill Smith
Chief Information Officer
State of Alaska

Drew Spath
Chief of IT Operations
AK Dept of Family & Community Services

Jerry Tibor
Manager, LAN
University of Alaska Anchorage

Hugh Towe
Manager, Information Technology
AK Fish and Wildlife

David Vanzant
Sr Vice President, Enterprise Security
Global Credit Union

Joe Waters
Manager, Information Technology
AK Department of Public Safety

Hutch White
Information Systems Security Officer
South Central Foundation

Eric Wren
Manager, Information Security Infrastructure
Chugach Electric

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Pure Storage

Pure Storage

Pure Storage
Pure Storage uncomplicates data storage, delivering a cloud experience that empowers organizations to maximize their data while reducing the complexity and expense of managing the infrastructure behind it. With certified customer satisfaction in the top 1% of B2B companies, Pure's customers are among the happiest in the world.
Visit Website
Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
Axonius

Axonius

Axonius
Axonius is an asset inventory management platform that focuses on cybersecurity solutions and policies.
Visit Website
BIG

BIG

BIG
Want to see your business grow but not sure where to start? Reach new heights with world-class business consulting from Business Improvement Group.
Visit Website
Cato Networks

Cato Networks

Cato Networks
Cato provides the world’s most robust single-vendor SASE platform, converging Cato SD-WAN and a cloud-native security service edge, Cato SSE 360, into a global cloud service. Cato SASE Cloud optimizes and secures application access for all users and locations everywhere.
Visit Website
CompuNet

CompuNet

CompuNet
CompuNet is a leading U.S. information technology partner, headquartered in Boise, Idaho. The firm specializes in consultation, design and implementation services specifically tailored to solve business problems. With a best-in-class engineering staff and approach, CompuNet focuses on building lasting relationships that prioritize client satisfaction over sales through every step of the journey.
Visit Website
GCSIT

GCSIT

GCSIT
GCSIT is a different kind of engineering firm. We act as your personal technology optimization team to create and maintain custom-built, agile infrastructure. We help you transition to the right technology solutions to better handle complex and dynamic challenges.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
ImageSource

ImageSource

ImageSource
ImageSource is a software and systems integration firm specializing in Enterprise Content Management.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website
Red Siege

Red Siege

Red Siege
Red Siege is one of the most trusted information security consulting firms in the industry that concentrates on the latest threats to organizations today. Red Siege performs in-depth analysis, determine organization/business risk, and finds the vulnerabilities before the bad guys do. The Red Siege team of trained, qualified, and experienced information security experts is led by one of the most recognized names in the industry, our CEO Tim Medin.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website
Splunk

Splunk

Splunk
Splunk is the key to enterprise resilience. Our platform enables organizations around the world to prevent major issues, absorb shocks and accelerate digital transformation.
Visit Website
Thales

Thales

Thales
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks.
Visit Website
Verizon

Verizon

Verizon
We create connections that advance global business opportunities and enrich lives. Despite the challenges of today’s rapidly changing environments, the right technologies can help drive growth and performance, as well as improve the customer experience.
Visit Website
Zerto

Zerto

Zerto
Zerto, a Hewlett Packard Enterprise company, empowers customers to run an always-on business by simplifying the protection, recovery, and mobility of on-premises and cloud applications.
Visit Website

BRONZE SPONSORS

APC by Schneider Electric

APC by Schneider Electric

APC by Schneider Electric
APC, a flagship brand of Schneider Electric, provides clean battery backup power, surge protection and IT physical infrastructure inside and outside the traditional IT environment. Through APC brand products and solutions, they offer certainty in a connected world. Certainty that their reliable, integrated physical infrastructure solutions are based on the fundamental premise that your data and information should —and always will be —accessible.
Visit Website
baramundi

baramundi

baramundi
baramundi Software offers efficient, secure, and cross-platform management of workstation environments. With over 20 years of UEM experience across the globe, over 4,000 customers benefit from our intuitive, single-interface platform.
Visit Website
Cyera

Cyera

Cyera
The data security solution you've been waiting for. Cyera enables you to discover and classify data, protect it from exposure, and maintain a resilient posture.
Visit Website
Extreme Networks

Extreme Networks

Extreme Networks
Extreme Networks, Inc. (EXTR) delivers software-driven networking solutions that help IT departments everywhere deliver the ultimate business outcome: stronger connections with customers, partners and employees.
Visit Website
Granite Data

Granite Data

Granite Data
We are a CA certified DVBE IT Reseller, Enterprise and Logistics Service Provider, R2 Certified IT Recycler and OEM Repair Partner. We can help you with all phases of your IT-Life Cycle - Buy IT, Deploy IT, Secure IT, Use IT, Recycle IT.
Visit Website

SPONSOR HIGHLIGHTS

Enjoy enhanced experiences at INTERFACE Anchorage from these highlighted sponsors.

Alaska Communications

Alaska Communications

Alaska Communications
Alaska Communications is a trusted partner in broadband and managed IT for businesses, schools, healthcare providers, and state and local governments. We confidently provide the latest industry-specific solutions to help address the dynamics of your ever-changing business world.
Visit Website
baramundi

baramundi

baramundi
baramundi Software offers efficient, secure, and cross-platform management of workstation environments. With over 20 years of UEM experience across the globe, over 4,000 customers benefit from our intuitive, single-interface platform.
Visit Website
ICE Services

ICE Services

ICE Services
ICE Services, Inc. specializes in supporting life's basic needs in Alaska's most challenging conditions. Our company spans four divisions providing housing, catering, utilities, ICT, and industrial services to corporate partners with a primary focus on Alaska's North Slope.
Visit Website
Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

EXHIBITORS & ASSOCIATIONS

2Mobius

2Mobius

2Mobius
2Mobius provides quality design, architecture and importantly future growth. Spanning the world from Alaska to Thailand and Europe, working with companies large and small. Specializing in Application Access. From today's "Work From Home" employees to secure data access.
Visit Website
AK Office of Information Technology

AK Office of Information Technology

AK Office of Information Technology
The Office of Information Technology provides enterprise IT solutions to the State of Alaska. Our vision: One Government, empowered by innovative technical collaboration. Our aim: Reduce complexity, improve efficiency, and encourage creativity in order to securely provide better government services to all Alaskans.
Visit Website
Alasconnect

Alasconnect

Alasconnect
Stay ahead of evolving technology with Alasconnect, blending complex tech solutions with approachable consulting for seamless adoption and long-term business growth. Reach out to us today!
Visit Website
ArcticShield

ArcticShield

ArcticShield
ArcticShield trains and develops a cyber workforce as we usher in and embrace this new digital age to enhance cybersecurity for all.
Visit Website
Barracuda

Barracuda

Barracuda
Barracuda Networks is the worldwide leader in Security, Application Delivery and Data Protection Solutions. More than 200,000 global customers trust Barracuda to safeguard their employees, data, and applications from a wide range of threats. Barracuda provides easy, comprehensive and affordable solutions for email protection, application protection, network protection and data protection. We are continually innovating to deliver tomorrow’s security technology, today.
Visit Website
CDW-G

CDW-G

CDW-G
Information technology products, expertise, customer support and competitive pricing tailored to fit the unique needs of education, government and healthcare organizations.
Visit Website
CISA

CISA

CISA
CISA is the Nation’s risk advisor, working with partners to defend against today’s threats and collaborating to build more secure and resilient infrastructure for the future.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface & the power to take on the ever-increasing performance requirements of the borderless network – today and into the future.
Visit Website
ICE Services

ICE Services

ICE Services
ICE Services, Inc. specializes in supporting life's basic needs in Alaska's most challenging conditions. Our company spans four divisions providing housing, catering, utilities, ICT, and industrial services to corporate partners with a primary focus on Alaska's North Slope.
Visit Website
InfraGard Alaska

InfraGard Alaska

InfraGard Alaska
InfraGard is a partnership between the FBI and the private sector. It's an association of businesses,academic institutions,law enforcement agencies,and other participants dedicated who share information to prevent hostile acts against the U.S.
Visit Website
Invite Networks

Invite Networks

Invite Networks
Explore INVITE Networks managed IT services in Salt Lake City. We are your trusted resource for comprehensive IT solutions, including MSP, collaboration, cybersecurity, and more. Learn how we can support your business.
Visit Website
ISACA Anchorage

ISACA Anchorage

ISACA Anchorage
ISACA Anchorage is a local chapter of the international ISACA organization serving the Anchorage and Mat-Su areas. Our goal is to provide local IT audit, governance, and security professionals with the resources to the global ISACA organization.
Visit Website
Juniper Networks

Juniper Networks

Juniper Networks
Juniper Networks simplifies the complexities of networking with products, solutions and services in the cloud era to transform the way we connect, work and live.
Visit Website
LMJ Consulting

LMJ Consulting

LMJ Consulting
LMJ Consulting is an Alaskan based provider of CIO caliber managed IT services along with security and compliance.
Visit Website
MSPAA

MSPAA

MSPAA
The MSP Association of America (MSPAA) has been established with three primary missions, each of which follows a unique trajectory aimed at providing our clients, members, and students with a collaborative and informative pathway towards building a future for technology, business, and education.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website
PMI Alaska

PMI Alaska

PMI Alaska
The PMI Alaska Chapter will be recognized as a dynamic organization of Professional Project Managers dedicated to serving the business and educational community of Alaska through the advancement of Project Management.
Visit Website
SailPoint

SailPoint

SailPoint
SailPoint is the leading provider of identity security for the modern enterprise. Enterprise security starts and ends with identities and their access, yet the ability to manage and secure identities today has moved well beyond human capacity. Using a foundation of artificial intelligence and machine learning, the SailPoint Identity Security Platform delivers the right level of access to the right identities and resources at the right time— matching the scale, velocity, and environmental needs of today’s cloud-oriented enterprise. Our intelligent, autonomous, and integrated solutions put identity security at the core of digital business operations, enabling even the most complex organizations across the globe to build a security foundation capable of defending against today’s most pressing threats.
Visit Website
SHI

SHI

SHI
From designing cloud, data center and end user computing strategies that support your hybrid working model to delivering the hardware and software you need to run it, SHI is your complete IT partner.
Visit Website
Vasion

Vasion

Vasion
Empower end users by implementing a unified solution and cohesive ecosystem for print, and output management, and don’t stop there: add document and business process automation. Vasion offers unmatched operational efficiency and it’s easy to use, for you, for your end users. Get your life back and keep budgets in check.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website
Xiologix

Xiologix

Xiologix
Xiologix is a technology solution provider of business driven multi-vendor IT solutions to customers throughout the US and Canada. They offer a wide variety of hardware and software products from the world's leading IT companies.
Visit Website

Interested in becoming part of our next Anchorage event?

CONTACT US FOR INFO

Anchorage

Dena’ina Convention Center
Tikahtnu Ballroom
600 W. 7th Avenue
Anchorage, AK 99501

Directions & Parking

About Us

We are producers of quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2025 Events

  • Portland • March 21st
  • Anchorage • April 17th
  • Honolulu • May 22nd
  • Phoenix • June 13th
  • Montana • July 30th
  • Kansas City • August 14th
  • Boise • August 28th
  • Salt Lake City • September 18th
  • Spokane • October 16th
  • Omaha • November 6th
  • Seattle • December 11th
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2025 F2F Events, Inc.