Why Attend?

Why attend SecurityWeek's Ransomware Resilience & Recovery Summit?

Immersive: Immerse yourself in a virtual environment with thousands of enterprise security leaders to discuss the latest cybersecurity trends and gain insights into security strategies and emerging cyber threats.

CISO Panel Discussion: Hear discussions between enterprise security executives as they examine ransomware threats and challenges.

Networking: Delegates can interact with speakers and sponsors, and visit networking lounges and sponsor booths.

Exclusive: Ransomware has emerged as the gravest digital threat to American businesses today with data extortion ransom payments doubling year-over-year, leading to a massive multi-million dollar wealth transfer from U.S. organizations to cyber criminal syndicates.

Resources: Access technical and strategy resources to help support your security management programs.

Be Heard: Share your insights by networking with thousands of attendees.

Sponsored by

SecurityWeek Virtual Event Sponsorships

I want to become a sponsor

SecurityWeek Virtual Events Provide

  • BRAND AWARENESS: Introduce your brand to a large audience and deepen connections with existing customers and prospects through powerful brand integration by being part of a high-profile event that is heavily marketed for months.
  • THOUGHT LEADERSHIP: Demonstrate expertise and build trust by presenting to a targeted, information-hungry audience of cybersecurity professionals.
  • LEAD GENERATION: The scale of SecurityWeek’s virtual events serve as a cost effective lead generation platform to fuel your sales teams.

Speakers

Agenda

Agenda

February 25, 2026 11:00

Building Resilience: Best Practices from Cohesity

Ransomware attacks and digital disruptions are faster, smarter, and more destructive than ever. Stay resilient in this new era of cyber risk by attending our in-depth virtual summit, where we'll bring you frontline insights and practical strategies from experts who know what it takes to stay protected. Learn how IT teams like yours must rethink their defenses for the new year, harden critical systems, and ensure rapid recovery when the unexpected strikes. Whether you're securing data, infrastructure, or all of the above, this is your chance to get ahead of emerging attacks. 

Join our Field CISO, Dr. Joye Purser, to learn more about best practices for building resiliency, including her Recovery Must-Haves: 

  • Cyber Vault: An immutable, isolated, air-gapped, and secure copy of your backup data. Threat actors cannot access, change, or delete the files.
  • Digital Jump Bag: Light and contains quick-access items during a disaster. The Digital Jump Bag contains passcodes, keys, configurations, and other foundations that enable you to restore your crown jewels - or minimum viable company - following an incident.
  • Clean Room & Forensics: The “clean room” is an isolated environment with compartments for forensics, and for re-build/ restore activities. People and processes involving forensics - threat hunting and evidence collection - and other incident response activities - may be occurring in parallel to the Backup Team’s efforts to re-build in the face of ransomware. The Clean Room is compartmented to prevent leakage of malware or sensitive communications into places they shouldn’t be.
speaker headshot

Dr. Joye Purser
Global Field CISO Cohesity

February 25, 2026 11:30

How to Leverage Cloud Threat Intelligence without Drowning: The Zero-Noise Approach

Cloud threat intelligence should simplify detection—but often creates noise instead. With vast TI data and automated attacks flooding alerts, many teams struggle to separate real threats from background noise. This session introduces the Zero Noise Approach—a methodology for ingesting and operationalizing Cloud TI through attacker-based baselines, continuous feedback loops, and a “no alert left behind” mindset. Learn how this approach turns TI from overwhelming to actionable, with real-world case studies showing how organizations achieved higher fidelity detections and clearer visibility into attacker TTPs.

speaker headshot

Yotam Meitar
Director, Cloud Response, Wiz

February 25, 2026 12:00

Strengthening the Human Firewall: Empowering Teams in the Age of AI

As AI reshapes the threat landscape, organizations must rethink how they protect against human-centric risk. This session explores how security leaders can strengthen their “human firewall” in the age of AI -- addressing emerging threats, modernizing security awareness programs for real-world behavior, and embedding security into everyday company culture. Attendees will learn practical strategies to boost user resilience and improve behavioral threat detection using Adaptive.

speaker headshot

Brian Long
CEO & Co-founder Adaptive Security

February 25, 2026 12:30

BREAK

Please visit our sponsors in the Exhibit Hall. View resources and chat with their experts.

February 25, 2026 12:45

The New Face of Fraud: Social Engineering, AI, and the Path to Ransomware

Attackers are no longer just "breaking in"; they are being "invited in" by unsuspecting users. Join our experts as we dive into the latest social engineering tactics, including brand impersonation and fake browser updates. Discover how AI has lowered the barrier to entry for cybercriminals, enabling them to spin up convincing phishing/social engineering sites and exploits in minutes to steal credentials and initiate the delivery of ransomware payloads.

speaker headshot

Roslyn Rissler
Senior Manager of Cybersecurity Strategy, Menlo Security

speaker headshot

Amelia Squires
Sr. Threat Intelligence Analyst, Menlo Security

speaker headshot

Jonathan Lee
Principle Product Manager, Menlo Security

February 25, 2026 13:15

Cyber Insurance's Role in Ransomware Response and Recover

Unlike many other kinds of insurance, cyber insurance provides more than a reimbursement of expenses. From 24/7 claims support to expert, experienced, pre-vetted vendors to assist you in responding to an incident to recovery and setting you on the path to better resilience, your cyber insurance policy helps you respond to ransomware more quickly and effectively than trying to go it alone. This session will prepare you to get the most out of your policy when you really need it- and you likely will.

speaker headshot

Monique Ferraro
Prof., Albany Law School, Independent Consultant

February 25, 2026 13:45

Syndicate: Inside the Life of a Ransomware Affiliate

Drawing on real-world cases, leaked chats, and observed operations, this session explores what a modern ransomware syndicate actually looks like from the affiliate’s perspective: how access is acquired, how partnerships form and dissolve, how trust is negotiated without loyalty, and how operations move from initial intrusion to encryption and extortion.

speaker headshot

Tammy Harper
Senior Threat Intelligence Researcher Flare

February 25, 2026 14:15

The Ransomware Deadlock: Rules of Spherical Security

Shifting the Paradigm from Vulnerable Backups to Invincible Recovery

The traditional "defense-in-depth" model is failing. In 2026, ransomware strains are designed with one primary goal: to find, compromise, and wipe out the backup infrastructure before the first file is even encrypted. If your backup can be seen, it can be killed.

It’s time to change the game. This session introduces Spherical Security - a departure from linear, layered defenses toward a holistic, 360-degree protection model. We will explore how to create a "Ransomware Deadlock" where attackers, even with administrative privileges, find themselves unable to delete, modify, or encrypt the recovery core.

We will deconstruct the architecture of an invincible repository by implementing the 3-2-1-1-0 Rule:

  • The Power of One (Immutability): Leveraging Single Write Repository logic and WORM (Write Once, Read Many) technology to ensure data stays unchangeable at the bit level.
  • The Modern AirGap: Beyond the "offline" myth—how to achieve logical and physical isolation that meets 2026’s recovery speed requirements.
  • The Zero-Point (Integrity): Why the "0" in 3-2-1-1-0 (zero errors through automated verification) is the most critical metric in a post-attack scenario.

Attendees will gain a new perspective on data storage trends and a technical blueprint for building a recovery environment that doesn't just survive ransomware but makes it irrelevant.

speaker headshot

Lukasz Nowatkowski
Cybersecurity Advocate Xopero Software S.A.

February 25, 2026 14:45

Networking & Virtual Expo

We hope your virtual experience at SecurityWeek's 2026 Ransomware Resilience & Recovery Summit has been informative and productive. If you missed any sessions, you may watch them now on-demand in the Auditorium. We would like to take this opportunity to thank our sponsors: Cohesity, Wiz, Adaptive Security, and Menlo Security. Stop by their booths and chat with their experts before you leave!

[On-Demand] The Cohesity 5 Steps of Cyber Resilience

[On-Demand] Menlo Security HEAT Shield AI with Google Gemini

A brief demo of Menlo Security HEAT Shield AI with Google Gemini

[On-Demand] Wiz Demo

See how the Wiz Platform helps organizations protect everything they build and run in the cloud

[On-Demand] Exploring the Adaptive Security Platform

Register

FAQ


Yes, you’ll need to fill out our registration form to gain access to the event. Please fill in the registration form with some basic information to get started.
The information you provide upon registration will be used to establish you as a user on the platform.

SecurityWeek is committed to protecting and respecting your privacy. From time to time, we would like to contact you about our products and services, as well as other content and information from event sponsors that may be of interest to you. You may unsubscribe from these communications at any time.

By registering for this event, you consent to allow SecurityWeek to store and process the personal information submitted to provide you the content requested.
Yes, the vFairs platform is compatible with any computer or mobile device and any browser.
Yes, this event is completely free to attend. We encourage you to login and have a look around at your convenience.
Yes, the event will be available on-demand following the live broadcast.