Ransomware Resilience & Recovery Summit

Ransomware Virtual Event 2025

February 26, 2025

Register for Virtual Events

With ransomware attacks still hitting big-name victims across industries with ruthless efficiency, SecurityWeek’s Ransomware Resilience & Recovery Summit is a must-attend for cybersecurity professionals at companies large and small.

SecurityWeek’s Ransomware Resilience and Recovery Summit was designed to help businesses to plan, prepare, and recover from a ransomware incident.

Gold Sponsors

Zerto

Become a sponsor

This one-day virtual event will host robust discussion on the sometimes controversial strategies at the intersection of cybersecurity and corporate ethics, such as the dilemma of paying ransoms and the murky waters of negotiating with cybercriminals. Interactive panels will unpack real-world scenarios, evaluating the repercussions of ransom payment and exploring negotiation tactics with a lens on legal, financial, and reputational stakes.

The discourse aims to transcend beyond the theoretical, providing attendees with a nuanced understanding of ransom negotiation implications and fostering a space to cultivate more transparent and ethical response strategies.

Register for Event

time iconFebruary 26, 2025 11:00

Fortifying Your Data Defenses – Rapid Recovery with Zerto

Are you ready to elevate your data protection game? With ransomware attacks becoming more sophisticated, ensuring the security of your virtual on-premise and public cloud environments is crucial. Join Anthony Dutra, Technical Marketing Manager at Zerto, a Hewlett Packard Enterprise company, to unlock the secrets of robust data protection and rapid (and in some cases, even air gapped!) recovery. You will learn how Zerto layers in: 

  • Detection and protection your virtual machines from cyber threats
  • Achieving near-zero data loss and recover in minutes
  • Resilience in a vaulted and isolated recovery environment with the Zerto Cyber Resilience Vault
speaker headshot

Anthony Dutra
Technical Marketing Manager, Zerto, a Hewlett Packard Company

time iconFebruary 26, 2025 11:30

AI-Powered Cyber Resilience: Shifting the Focus from Protection to Recovery

The cybersecurity battlefield is transforming. Often driven by AI-powered attacks, cybercriminals are bypassing traditional protective defenses, creating more complex and adaptive threat vectors that challenge conventional security paradigms. Organizations must adopt strategies that focus on trusted recovery and prioritize data resilience. This requires:

  • Implementing four strategic pillars for a fast and effective recovery
  • Preserving isolated, unaffected data copies, thus ensuring data integrity
  • Developing robust incident response capabilities including deep data inspection and action-oriented forensics to strengthen overall security posture 

Emerging regulatory frameworks like NIS2.0 in the EU and CSF2 in the US are mandating stringent prevention and recovery standards. Governments are shifting from guidelines to legislation, compelling organizations to demonstrate comprehensive cyber preparedness. This breakout session addresses the challenges and opportunities related to the new security imperative: Assume breach, prepare comprehensively, and develop agile recovery mechanisms that can rapidly validate data integrity and restore critical systems.

speaker headshot

Jim McGann
VP of Strategic Partnerships, Index Engines

speaker headshot

Danielle Goode Coady
VP of Marketing, Index Engines

time iconFebruary 26, 2025 12:00

Building Cyber Resilience: Are You on the Right Track?

Cyber resilience isn't about racing from zero to 100—it's about knowing where you stand in the journey, charting the right course, and methodically advancing your organization's cyber resilience maturity in a way that supports your business needs and industry demands. This session offers a practical framework to assess cyber resilience maturity, prioritize outcomes, and shift from a protection-only mindset to building resilience. Walk away with a clear roadmap to long-term cyber resilience, along with a risk-based approach to building a business case with your IT and security teams.

speaker headshot

Brian Knudtson
Technical Marketing Architect, Rubrik

time iconFebruary 26, 2025 12:45

PANEL: Defenders on the Frontline: Incident Response and Threat Intel Under the Microscope

In collaboration with the CISO Forum, we're pleased to welcome this panel of CISOs and threat-intel professionals for a deep-dive on aligning incident response and threat intelligence with broader business objectives. Panelists will explore practical strategies for managing an ever-expanding attack surface, offering candid recommendations into how enterprises can refine their cyber resilience plans and secure hardware, software and vendor supply chains. Attendees can expect discussion on risks from nation-state adversaries, ransomware, cryptocurrency heists, business email compromise, phishing, and identity-related attacks.

speaker headshot

Jonathan Jaffe
Chief Information Security Officer, Lemonade

speaker headshot

Costin Raiu
Threat Intelligence and Research, Art of Noh

speaker headshot

Shane Hasert
Director - Threat Research and Cyber Security Standards, ProcessUnity

speaker headshot

Ryan Naraine
Editor-at-Large, SecurityWeek

time iconFebruary 26, 2025 12:30

BREAK

Please visit our sponsors in the Exhibit Hall. View resources and chat with their experts.

time iconFebruary 26, 2025 13:45

Zerto Cyber Resilience Vault

Modern threats don't respect the boundaries of traditional security - they move laterally as quickly as possible, finding the path of least resistance to gain credentials and access to data or infrastructure. For the analyst; visibility across endpoint, cloud, data, and identities is critical to understanding posture and rapidly responding to attacks. Learn about our vision for XDR and how the Singularity Platform can protect your business from threats like ransomware during this demonstration.

time iconFebruary 26, 2025 14:05

CyberSense in Action: Ransomware Post-Attack Investigation

In this demonstration, Greg Potocki from Index Engines walks through a post-attack investigation using CyberSense, showing how IT and Security teams can identify a ransomware attack, analyze its blast radius, and restore clean data quickly. The session explores how CyberSense:

  • Identifies data corruption and provides timely forensic reports.
  • Uses AI-powered analysis to pinpoint indications of data corruption at the byte level.
  • Ensures data integrity by identifying the last known clean backup, reducing operational stops, and minimizing the cost of downtime. 
time iconFebruary 26, 2025 14:20

Demo: Intro to Rubrik Security Cloud

Become unstoppable against cyberattacks and operational failures. Rubrik Security Cloud helps you protect your data, monitor data risk, and recover data and applications, so you can keep your business moving forward.

time iconFebruary 26, 2025 13:50

Networking & Virtual Expo

We hope your virtual experience at SecurityWeek's 2025 Ransomware Resilience & Recovery Summit has been informative and productive. If you missed any sessions, you may watch them now on-demand in the Auditorium. We would like to take this opportunity to thank our sponsors: Index Engines, Rubrik, and Zerto, a Hewlett Packard Company. Stop by their booths and chat with their experts before you leave!

Solutions Theater (On-demand)

time icon

[On-Demand] Zerto Cyber Resilience Vault

Exploring how Zerto is helping organisations meet industry requirements to achieve robust data protection and recovery strategies.

time icon

[On-Demand] CyberSense in Action: Ransomware Post-Attack Investigation

In this demonstration, Greg Potocki from Index Engines walks through a post-attack investigation using CyberSense, showing how IT and Security teams can identify a ransomware attack, analyze its blast radius, and restore clean data quickly. The session explores how CyberSense:

  • Identifies data corruption and provides timely forensic reports.
  • Uses AI-powered analysis to pinpoint indications of data corruption at the byte level.
  • Ensures data integrity by identifying the last known clean backup, reducing operational stops, and minimizing the cost of downtime. 
time icon

[On-Demand] Demo: Intro to Rubrik Security Cloud

Become unstoppable against cyberattacks and operational failures. Rubrik Security Cloud helps you protect your data, monitor data risk, and recover data and applications, so you can keep your business moving forward.

This one-day virtual event will feature sessions from malware researchers, threat hunters, law enforcement officers, legal and compliance practitioners, CISOs and defenders shining a spotlight on shadowy dynamics of ransomware attacks.

Expect a robust discussion on the sometimes controversial strategies at the intersection of cybersecurity and corporate ethics, such as the dilemma of paying ransoms and the murky waters of negotiating with cybercriminals. Interactive panels will unpack real-world scenarios, evaluating the repercussions of ransom payment and exploring negotiation tactics with a lens on legal, financial, and reputational stakes.

SESSIONS will provide defenders with actionable data and best known methods for successfully limiting exposure to – and damage from – ransomware data extortion attacks.

SPEAKERS at the event will include a mix of high-profile CISOs, threat-intelligence analysts, network defenders, government and law enforcement professionals, malware researchers and business and legal analysts.

Event Details
  • Start Date
    February 26, 2025 11:00 am

  • End Date
    February 26, 2025 3:00 pm