Agenda
February 26, 2025 11:00
to
11:30
Fortifying Your Data Defenses – Rapid Recovery with Zerto
Are you ready to elevate your data protection game? With ransomware attacks becoming more sophisticated, ensuring the security of your virtual on-premise and public cloud environments is crucial. Join Anthony Dutra, Technical Marketing Manager at Zerto, a Hewlett Packard Enterprise company, to unlock the secrets of robust data protection and rapid (and in some cases, even air gapped!) recovery. You will learn how Zerto layers in:
- Detection and protection your virtual machines from cyber threats
- Achieving near-zero data loss and recover in minutes
- Resilience in a vaulted and isolated recovery environment with the Zerto Cyber Resilience Vault
Anthony Dutra
Technical Marketing Manager, Zerto, a Hewlett Packard Company
Anthony Dutra is a Technical Marketing Manager at Zerto, a Hewlett Packard Company, who specializes in solution architecture, designing microservices in the public cloud, and developing web3 (blockchain) applications. For the past decade, Anthony has leveraged his Master’s in IT Management to become a trusted technical partner with organizations seeking to modernize their data center or migrate to the cloud.
February 26, 2025 11:30
to
12:00
AI-Powered Cyber Resilience: Shifting the Focus from Protection to Recovery
The cybersecurity battlefield is transforming. Often driven by AI-powered attacks, cybercriminals are bypassing traditional protective defenses, creating more complex and adaptive threat vectors that challenge conventional security paradigms. Organizations must adopt strategies that focus on trusted recovery and prioritize data resilience. This requires:
- Implementing four strategic pillars for a fast and effective recovery
- Preserving isolated, unaffected data copies, thus ensuring data integrity
- Developing robust incident response capabilities including deep data inspection and action-oriented forensics to strengthen overall security posture
Emerging regulatory frameworks like NIS2.0 in the EU and CSF2 in the US are mandating stringent prevention and recovery standards. Governments are shifting from guidelines to legislation, compelling organizations to demonstrate comprehensive cyber preparedness. This breakout session addresses the challenges and opportunities related to the new security imperative: Assume breach, prepare comprehensively, and develop agile recovery mechanisms that can rapidly validate data integrity and restore critical systems.
Jim McGann
VP of Strategic Partnerships, Index Engines
Jim McGann is a globally experienced marketing and business development executive instrumental in developing key relationships and brand development at Index Engines. He is experienced working with both large established software firms and emerging startups and is a frequent writer and speaker in the areas of ransomware recovery, cyberresilience, and unstructured data management.
Danielle Goode Coady
VP of Marketing, Index Engines
Danielle Goode Coady is the VP of Marketing at Index Engines, leading strategy for the company and its flagship product, CyberSense. A seasoned marketing leader in cyber recovery, data protection, cloud solutions, and AI, she has driven strategic programs for Dell, Red Hat, Hitachi, and multiple startups. With a track record of collaborating with industry leaders like VMware, NVIDIA, and AWS, she focuses on accelerating growth and market impact.
February 26, 2025 12:00
to
12:30
Building Cyber Resilience: Are You on the Right Track?
Cyber resilience isn't about racing from zero to 100—it's about knowing where you stand in the journey, charting the right course, and methodically advancing your organization's cyber resilience maturity in a way that supports your business needs and industry demands. This session offers a practical framework to assess cyber resilience maturity, prioritize outcomes, and shift from a protection-only mindset to building resilience. Walk away with a clear roadmap to long-term cyber resilience, along with a risk-based approach to building a business case with your IT and security teams.
Brian Knudtson
Technical Marketing Architect, Rubrik
In his 25-year career Brian has seen the IT industry from a range of perspectives: customer, value-added reseller, vendor, and service provider. With experience in web development, system administration and analysis, pre-sales architecting, public cloud design, product development, and technical marketing, Brian now serves as a Technical Marketing Architect at Rubrik.
February 26, 2025 12:30
to
12:45
BREAK
Please visit our sponsors in the Exhibit Hall. View resources and chat with their experts.
February 26, 2025 12:45
to
13:45
PANEL: Defenders on the Frontline: Incident Response and Threat Intel Under the Microscope
In collaboration with the CISO Forum, we're pleased to welcome this panel of CISOs and threat-intel professionals for a deep-dive on aligning incident response and threat intelligence with broader business objectives. Panelists will explore practical strategies for managing an ever-expanding attack surface, offering candid recommendations into how enterprises can refine their cyber resilience plans and secure hardware, software and vendor supply chains. Attendees can expect discussion on risks from nation-state adversaries, ransomware, cryptocurrency heists, business email compromise, phishing, and identity-related attacks.
Jonathan Jaffe
Chief Information Security Officer, Lemonade
Jonathan Jaffe is the CISO at Lemonade, a full-stack insurance carrier built to provide the best, most delightful, and most transparent insurance experience in the world. His career has focused on security with a mid-career detour as a privacy litigator, where he famously brought and settled the largest privacy class action in the US at the time. Jonathan is also a founding member of SVCI, a security-focused investment group. He organizes TLV CISOs meet-ups, and actively supports Israeli security start-ups to bring better security to all.
Costin Raiu
Threat Intelligence and Research, Art of Noh
Security researcher with 30 years of experience in the antivirus industry. Working on new threat defense technologies, next generation endpoint security, targeted attacks protection, APTs, threat intelligence and reverse engineering. Interested to connect with other like-minded professionals. Experience in antivirus research and development, APTs analysis, threat intelligence, security articles and whitepapers, presenting on any security-related subjects, designing software systems, reverse engineering, cryptography and cloud computing. I like to succeed in difficult environments and challenging situations, as well as through sudden, disruptive changes, while having a proactive and entrepreneurial attitude. Black belt in #Taekwondo, love #chess and SF literature.
Shane Hasert
Director - Threat Research and Cyber Security Standards, ProcessUnity
Shane Hasert has 35 years of experience as a cybersecurity professional, and 18 of those years are dedicated specifically to third-party risk management and auditing. He is an Air Force veteran and has held positions leading security programs with several global consulting and security services firms supporting numerous industries including financial services, retail, healthcare, higher education, mortgage insurance, and gaming. Shane is a Certified Information Systems Security Professional (CISSP), Certified Information Security Auditor (CISA), Certified in Risk and Information Systems Controls (CRISC), Certified Data Privacy Solutions Engineer (CDPSE), Certified Third-Party Risk Assessor (CTPRA), and a Certified Third-Party Risk Professional (CTPRP); and holds an AS in Intelligence Analysis, BS in Business Management and MBA in Project Management.
Ryan Naraine
Editor-at-Large, SecurityWeek
Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.
February 26, 2025 13:45
to
14:05
Zerto Cyber Resilience Vault
Modern threats don't respect the boundaries of traditional security - they move laterally as quickly as possible, finding the path of least resistance to gain credentials and access to data or infrastructure. For the analyst; visibility across endpoint, cloud, data, and identities is critical to understanding posture and rapidly responding to attacks. Learn about our vision for XDR and how the Singularity Platform can protect your business from threats like ransomware during this demonstration.
February 26, 2025 14:05
to
14:20
CyberSense in Action: Ransomware Post-Attack Investigation
In this demonstration, Greg Potocki from Index Engines walks through a post-attack investigation using CyberSense, showing how IT and Security teams can identify a ransomware attack, analyze its blast radius, and restore clean data quickly. The session explores how CyberSense:
- Identifies data corruption and provides timely forensic reports.
- Uses AI-powered analysis to pinpoint indications of data corruption at the byte level.
- Ensures data integrity by identifying the last known clean backup, reducing operational stops, and minimizing the cost of downtime.
February 26, 2025 14:20
to
14:50
Demo: Intro to Rubrik Security Cloud
Become unstoppable against cyberattacks and operational failures. Rubrik Security Cloud helps you protect your data, monitor data risk, and recover data and applications, so you can keep your business moving forward.
February 26, 2025 13:50
to
15:00
Networking & Virtual Expo
We hope your virtual experience at SecurityWeek's 2025 Ransomware Resilience & Recovery Summit has been informative and productive. If you missed any sessions, you may watch them now on-demand in the Auditorium. We would like to take this opportunity to thank our sponsors: Index Engines, Rubrik, and Zerto, a Hewlett Packard Company. Stop by their booths and chat with their experts before you leave!
[On-Demand] Zerto Cyber Resilience Vault
Exploring how Zerto is helping organisations meet industry requirements to achieve robust data protection and recovery strategies.
[On-Demand] CyberSense in Action: Ransomware Post-Attack Investigation
In this demonstration, Greg Potocki from Index Engines walks through a post-attack investigation using CyberSense, showing how IT and Security teams can identify a ransomware attack, analyze its blast radius, and restore clean data quickly. The session explores how CyberSense:
- Identifies data corruption and provides timely forensic reports.
- Uses AI-powered analysis to pinpoint indications of data corruption at the byte level.
- Ensures data integrity by identifying the last known clean backup, reducing operational stops, and minimizing the cost of downtime.
[On-Demand] Demo: Intro to Rubrik Security Cloud
Become unstoppable against cyberattacks and operational failures. Rubrik Security Cloud helps you protect your data, monitor data risk, and recover data and applications, so you can keep your business moving forward.