facebook sharing button
twitter sharing button
email sharing button
whatsapp sharing button
sms sharing button
sharethis sharing button
arrow_left sharing button
arrow_right sharing button

About Ransomware Resilience & Recovery Summit

Ransomware attacks continue to impose major costs on enterprise security programs, underscoring the need for multi-pronged approaches to avoid falling victim to million-dollar extortion schemes.

Join us as we separate hype from reality, identify the root causes, and share best practices on vulnerability management, attack surface reduction, secure cloud deployments, data back-ups and recovery, table-top exercises and post-infection remediation.

Agenda

-

[On-Demand] Zerto Cyber Resilience Vault

Exploring how Zerto is helping organisations meet industry requirements to achieve robust data protection and recovery strategies.

-

[On-Demand] CyberSense in Action: Ransomware Post-Attack Investigation

In this demonstration, Greg Pataki from Index Engines walks through a post-attack investigation using CyberSense, showing how IT and Security teams can identify a ransomware attack, analyze its blast radius, and restore clean data quickly. The session explores how CyberSense:

  • Identifies data corruption and provides timely forensic reports.
  • Uses AI-powered analysis to pinpoint indications of data corruption at the byte level.
  • Ensures data integrity by identifying the last known clean backup, reducing operational stops, and minimizing the cost of downtime. 

April 17, 2024 15:00 to 16:00

Networking & Virtual Expo

We hope your virtual experience at SecurityWeek’s Ransomware Resilience & Recovery Summit has been informative and productive. If you missed any sessions, you may watch them now on-demand in the Auditorium. We would like to take this opportunity to thank our sponsors: Binarly, ReversingLabs and Eclypsium. Stop by their booths and chat with their experts before you leave!

February 26, 2025 11:00 to 11:30

Fortifying Your Data Defenses – Rapid Recovery with Zerto

Are you ready to elevate your data protection game? With ransomware attacks becoming more sophisticated, ensuring the security of your virtual on-premise and public cloud environments is crucial. Join Anthony Dutra, Technical Marketing Manager at Zerto, a Hewlett Packard Enterprise company, to unlock the secrets of robust data protection and rapid (and in some cases, even air gapped!) recovery. You will learn how Zerto layers in: 

• Detection and protection your virtual machines from cyber threats 

• Achieving near-zero data loss and recover in minutes 

• Resilience in a vaulted and isolated recovery environment with the Zerto Cyber Resilience Vault

Anthony Dutra

Technical Marketing Manager, Zerto, a Hewlett Packard Company

Anthony Dutra is a Technical Marketing Manager at Zerto, a Hewlett Packard Company, who specializes in solution architecture, designing microservices in the public cloud, and developing web3 (blockchain) applications. For the past decade, Anthony has leveraged his Master’s in IT Management to become a trusted technical partner with organizations seeking to modernize their data center or migrate to the cloud.

February 26, 2025 11:30 to 12:00

AI-Powered Cyber Resilience: Shifting the Focus from Protection to Recovery

The cybersecurity battlefield is transforming. Often driven by AI-powered attacks, cybercriminals are bypassing traditional protective defenses, creating more complex and adaptive threat vectors that challenge conventional security paradigms. Organizations must adopt strategies that focus on trusted recovery and prioritize data resilience. This requires:

  • Implementing four strategic pillars for a fast and effective recovery
  • Preserving isolated, unaffected data copies, thus ensuring data integrity
  • Developing robust incident response capabilities including deep data inspection and action-oriented forensics to strengthen overall security posture 

Emerging regulatory frameworks like NIS2.0 in the EU and CSF2 in the US are mandating stringent prevention and recovery standards. Governments are shifting from guidelines to legislation, compelling organizations to demonstrate comprehensive cyber preparedness. This breakout session addresses the challenges and opportunities related to the new security imperative: Assume breach, prepare comprehensively, and develop agile recovery mechanisms that can rapidly validate data integrity and restore critical systems.

Jim McGann

VP of Strategic Partnerships, Index Engines

Jim McGann is a globally experienced marketing and business development executive instrumental in developing key relationships and brand development at Index Engines. He is experienced working with both large established software firms and emerging startups and is a frequent writer and speaker in the areas of ransomware recovery, cyberresilience, and unstructured data management.

February 26, 2025 12:00 to 12:30

Building Cyber Resilience: Are You on the Right Track?

In this session, we will discuss the ever-prevalent ransomware threat and its characterization in the current threat landscape. Join the experts from CrowdStrike’s Falcon Complete managed detection and response (MDR) team to see firsthand what it takes to stop today’s most advanced attacks. Attendees will gain unique insights into the tactics, techniques, and procedures behind ransomware operator tradecraft and learn how to investigate and eradicate threats in real-time.

Brian Knudtson

Technical Marketing Architect, Rubrik

In his 25-year career Brian has seen the IT industry from a range of perspectives: customer, value-added reseller, vendor, and service provider. With experience in web development, system administration and analysis, pre-sales architecting, public cloud design, product development, and technical marketing, Brian now serves as a Technical Marketing Architect at Rubrik.

February 26, 2025 12:30 to 12:45

BREAK

Please visit our sponsors in the Exhibit Hall. View resources and chat with their experts.

February 26, 2025 12:45 to 13:30

Editorial Content

TBD

February 26, 2025 13:30 to 13:50

Zerto Cyber Resilience Vault

Modern threats don't respect the boundaries of traditional security - they move laterally as quickly as possible, finding the path of least resistance to gain credentials and access to data or infrastructure. For the analyst; visibility across endpoint, cloud, data, and identities is critical to understanding posture and rapidly responding to attacks. Learn about our vision for XDR and how the Singularity Platform can protect your business from threats like ransomware during this demonstration.

February 26, 2025 13:50 to 14:00

CyberSense in Action: Ransomware Post-Attack Investigation

In this demonstration, Greg Pataki from Index Engines walks through a post-attack investigation using CyberSense, showing how IT and Security teams can identify a ransomware attack, analyze its blast radius, and restore clean data quickly. The session explores how CyberSense:

  • Identifies data corruption and provides timely forensic reports.
  • Uses AI-powered analysis to pinpoint indications of data corruption at the byte level.
  • Ensures data integrity by identifying the last known clean backup, reducing operational stops, and minimizing the cost of downtime. 

Event Sponsors