facebook sharing button
twitter sharing button
email sharing button
whatsapp sharing button
sms sharing button
sharethis sharing button
arrow_left sharing button
arrow_right sharing button

2025 Ransomware Resilience & Recovery Summit

Ransomware attacks continue to impose major costs on enterprise security programs, underscoring the need for multi-pronged approaches to avoid falling victim to million-dollar extortion schemes.

Join us as we separate hype from reality, identify the root causes, and share best practices on vulnerability management, attack surface reduction, secure cloud deployments, data back-ups and recovery, table-top exercises and post-infection remediation.

Agenda

February 26, 2025 11:00

to
11:30

Fortifying Your Data Defenses – Rapid Recovery with Zerto

Are you ready to elevate your data protection game? With ransomware attacks becoming more sophisticated, ensuring the security of your virtual on-premise and public cloud environments is crucial. Join Anthony Dutra, Technical Marketing Manager at Zerto, a Hewlett Packard Enterprise company, to unlock the secrets of robust data protection and rapid (and in some cases, even air gapped!) recovery. You will learn how Zerto layers in: 

  • Detection and protection your virtual machines from cyber threats
  • Achieving near-zero data loss and recover in minutes
  • Resilience in a vaulted and isolated recovery environment with the Zerto Cyber Resilience Vault
speaker headshot

Anthony Dutra
Technical Marketing Manager, Zerto, a Hewlett Packard Company

February 26, 2025 11:30

to
12:00

AI-Powered Cyber Resilience: Shifting the Focus from Protection to Recovery

The cybersecurity battlefield is transforming. Often driven by AI-powered attacks, cybercriminals are bypassing traditional protective defenses, creating more complex and adaptive threat vectors that challenge conventional security paradigms. Organizations must adopt strategies that focus on trusted recovery and prioritize data resilience. This requires:

  • Implementing four strategic pillars for a fast and effective recovery
  • Preserving isolated, unaffected data copies, thus ensuring data integrity
  • Developing robust incident response capabilities including deep data inspection and action-oriented forensics to strengthen overall security posture 

Emerging regulatory frameworks like NIS2.0 in the EU and CSF2 in the US are mandating stringent prevention and recovery standards. Governments are shifting from guidelines to legislation, compelling organizations to demonstrate comprehensive cyber preparedness. This breakout session addresses the challenges and opportunities related to the new security imperative: Assume breach, prepare comprehensively, and develop agile recovery mechanisms that can rapidly validate data integrity and restore critical systems.

speaker headshot

Jim McGann
VP of Strategic Partnerships, Index Engines

speaker headshot

Danielle Goode Coady
VP of Marketing, Index Engines

February 26, 2025 12:00

to
12:30

Building Cyber Resilience: Are You on the Right Track?

Cyber resilience isn't about racing from zero to 100—it's about knowing where you stand in the journey, charting the right course, and methodically advancing your organization's cyber resilience maturity in a way that supports your business needs and industry demands. This session offers a practical framework to assess cyber resilience maturity, prioritize outcomes, and shift from a protection-only mindset to building resilience. Walk away with a clear roadmap to long-term cyber resilience, along with a risk-based approach to building a business case with your IT and security teams.

speaker headshot

Brian Knudtson
Technical Marketing Architect, Rubrik

February 26, 2025 12:30

to
12:45

BREAK

Please visit our sponsors in the Exhibit Hall. View resources and chat with their experts.

February 26, 2025 12:45

to
13:45

PANEL: Defenders on the Frontline: Incident Response and Threat Intel Under the Microscope

In collaboration with the CISO Forum, we're pleased to welcome this panel of CISOs and threat-intel professionals for a deep-dive on aligning incident response and threat intelligence with broader business objectives. Panelists will explore practical strategies for managing an ever-expanding attack surface, offering candid recommendations into how enterprises can refine their cyber resilience plans and secure hardware, software and vendor supply chains. Attendees can expect discussion on risks from nation-state adversaries, ransomware, cryptocurrency heists, business email compromise, phishing, and identity-related attacks.

speaker headshot

Jonathan Jaffe
Chief Information Security Officer, Lemonade

speaker headshot

Costin Raiu
Threat Intelligence and Research, Art of Noh

speaker headshot

Shane Hasert
Director - Threat Research and Cyber Security Standards, ProcessUnity

speaker headshot

Ryan Naraine
Editor-at-Large, SecurityWeek

February 26, 2025 13:45

to
14:05

Zerto Cyber Resilience Vault

Modern threats don't respect the boundaries of traditional security - they move laterally as quickly as possible, finding the path of least resistance to gain credentials and access to data or infrastructure. For the analyst; visibility across endpoint, cloud, data, and identities is critical to understanding posture and rapidly responding to attacks. Learn about our vision for XDR and how the Singularity Platform can protect your business from threats like ransomware during this demonstration.

February 26, 2025 14:05

to
14:20

CyberSense in Action: Ransomware Post-Attack Investigation

In this demonstration, Greg Potocki from Index Engines walks through a post-attack investigation using CyberSense, showing how IT and Security teams can identify a ransomware attack, analyze its blast radius, and restore clean data quickly. The session explores how CyberSense:

  • Identifies data corruption and provides timely forensic reports.
  • Uses AI-powered analysis to pinpoint indications of data corruption at the byte level.
  • Ensures data integrity by identifying the last known clean backup, reducing operational stops, and minimizing the cost of downtime. 

February 26, 2025 14:20

to
14:50

Demo: Intro to Rubrik Security Cloud

Become unstoppable against cyberattacks and operational failures. Rubrik Security Cloud helps you protect your data, monitor data risk, and recover data and applications, so you can keep your business moving forward.

February 26, 2025 13:50

to
15:00

Networking & Virtual Expo

We hope your virtual experience at SecurityWeek's 2025 Ransomware Resilience & Recovery Summit has been informative and productive. If you missed any sessions, you may watch them now on-demand in the Auditorium. We would like to take this opportunity to thank our sponsors: Index Engines, Rubrik, and Zerto, a Hewlett Packard Company. Stop by their booths and chat with their experts before you leave!

[On-Demand] Zerto Cyber Resilience Vault

Exploring how Zerto is helping organisations meet industry requirements to achieve robust data protection and recovery strategies.

[On-Demand] CyberSense in Action: Ransomware Post-Attack Investigation

In this demonstration, Greg Potocki from Index Engines walks through a post-attack investigation using CyberSense, showing how IT and Security teams can identify a ransomware attack, analyze its blast radius, and restore clean data quickly. The session explores how CyberSense:

  • Identifies data corruption and provides timely forensic reports.
  • Uses AI-powered analysis to pinpoint indications of data corruption at the byte level.
  • Ensures data integrity by identifying the last known clean backup, reducing operational stops, and minimizing the cost of downtime. 

[On-Demand] Demo: Intro to Rubrik Security Cloud

Become unstoppable against cyberattacks and operational failures. Rubrik Security Cloud helps you protect your data, monitor data risk, and recover data and applications, so you can keep your business moving forward.

Event Sponsors

Frequently Asked Questions


Yes, please complete the registration form to gain access to the event.

The information you provide upon registration will be used to establish you as a user on the platform. 

SecurityWeek is committed to protecting and respecting your privacy. From time to time, we would like to contact you about our products and services, as well as other content and information from event sponsors that may be of interest to you. You may unsubscribe from these communications at any time. 

By registering for this event, you consent to allow SecurityWeek to store and process the personal information submitted to provide you the content requested.

Yes, the vFairs platform is compatible with any computer or mobile device and any browser.

Yes, this event is completely free to attend. We encourage you to login and have a look around at your convenience.

Yes, the event will be available on-demand following the live broadcast.

Read more