Registered Attendees
Live Sessions
Technical Demos
Interactive Expo Hall
Resource Center
Why attend SecurityWeek's Ransomware Resilience & Recovery Summit?
Immersive: Immerse yourself in a virtual environment with thousands of enterprise security leaders to discuss the latest cybersecurity trends and gain insights into security strategies and emerging cyber threats.
CISO Panel Discussion: Hear discussions between enterprise security executives as they examine ransomware threats and challenges.
Networking: Delegates can interact with speakers and sponsors, and visit networking lounges and sponsor booths.
Exclusive: Ransomware has emerged as the gravest digital threat to American businesses today with data extortion ransom payments doubling year-over-year, leading to a massive multi-million dollar wealth transfer from U.S. organizations to cyber criminal syndicates.
Resources: Access technical and strategy resources to help support your security management programs.
Be Heard: Share your insights by networking with thousands of attendees.
Coming Soon!
SecurityWeek Virtual Events Provide
Are you ready to elevate your data protection game? With ransomware attacks becoming more sophisticated, ensuring the security of your virtual on-premise and public cloud environments is crucial. Join Anthony Dutra, Technical Marketing Manager at Zerto, a Hewlett Packard Enterprise company, to unlock the secrets of robust data protection and rapid (and in some cases, even air gapped!) recovery. You will learn how Zerto layers in:
Anthony Dutra
Technical Marketing Manager, Zerto, a Hewlett Packard Company
The cybersecurity battlefield is transforming. Often driven by AI-powered attacks, cybercriminals are bypassing traditional protective defenses, creating more complex and adaptive threat vectors that challenge conventional security paradigms. Organizations must adopt strategies that focus on trusted recovery and prioritize data resilience. This requires:
Emerging regulatory frameworks like NIS2.0 in the EU and CSF2 in the US are mandating stringent prevention and recovery standards. Governments are shifting from guidelines to legislation, compelling organizations to demonstrate comprehensive cyber preparedness. This breakout session addresses the challenges and opportunities related to the new security imperative: Assume breach, prepare comprehensively, and develop agile recovery mechanisms that can rapidly validate data integrity and restore critical systems.
Jim McGann
VP of Strategic Partnerships, Index Engines
Danielle Goode Coady
VP of Marketing, Index Engines
Cyber resilience isn't about racing from zero to 100—it's about knowing where you stand in the journey, charting the right course, and methodically advancing your organization's cyber resilience maturity in a way that supports your business needs and industry demands. This session offers a practical framework to assess cyber resilience maturity, prioritize outcomes, and shift from a protection-only mindset to building resilience. Walk away with a clear roadmap to long-term cyber resilience, along with a risk-based approach to building a business case with your IT and security teams.
Brian Knudtson
Technical Marketing Architect, Rubrik
Please visit our sponsors in the Exhibit Hall. View resources and chat with their experts.
In collaboration with the CISO Forum, we're pleased to welcome this panel of CISOs and threat-intel professionals for a deep-dive on aligning incident response and threat intelligence with broader business objectives. Panelists will explore practical strategies for managing an ever-expanding attack surface, offering candid recommendations into how enterprises can refine their cyber resilience plans and secure hardware, software and vendor supply chains. Attendees can expect discussion on risks from nation-state adversaries, ransomware, cryptocurrency heists, business email compromise, phishing, and identity-related attacks.
Jonathan Jaffe
Chief Information Security Officer, Lemonade
Costin Raiu
Threat Intelligence and Research, Art of Noh
Shane Hasert
Director - Threat Research and Cyber Security Standards, ProcessUnity
Ryan Naraine
Editor-at-Large, SecurityWeek
Modern threats don't respect the boundaries of traditional security - they move laterally as quickly as possible, finding the path of least resistance to gain credentials and access to data or infrastructure. For the analyst; visibility across endpoint, cloud, data, and identities is critical to understanding posture and rapidly responding to attacks. Learn about our vision for XDR and how the Singularity Platform can protect your business from threats like ransomware during this demonstration.
In this demonstration, Greg Potocki from Index Engines walks through a post-attack investigation using CyberSense, showing how IT and Security teams can identify a ransomware attack, analyze its blast radius, and restore clean data quickly. The session explores how CyberSense:
Become unstoppable against cyberattacks and operational failures. Rubrik Security Cloud helps you protect your data, monitor data risk, and recover data and applications, so you can keep your business moving forward.
We hope your virtual experience at SecurityWeek's 2025 Ransomware Resilience & Recovery Summit has been informative and productive. If you missed any sessions, you may watch them now on-demand in the Auditorium. We would like to take this opportunity to thank our sponsors: Index Engines, Rubrik, and Zerto, a Hewlett Packard Company. Stop by their booths and chat with their experts before you leave!
Exploring how Zerto is helping organisations meet industry requirements to achieve robust data protection and recovery strategies.
In this demonstration, Greg Potocki from Index Engines walks through a post-attack investigation using CyberSense, showing how IT and Security teams can identify a ransomware attack, analyze its blast radius, and restore clean data quickly. The session explores how CyberSense:
Become unstoppable against cyberattacks and operational failures. Rubrik Security Cloud helps you protect your data, monitor data risk, and recover data and applications, so you can keep your business moving forward.