Registered Attendees
Live Sessions
Technical Demos
Interactive Expo Hall
Resource Center
Why attend SecurityWeek's Ransomware Resilience & Recovery Summit?
Immersive: Immerse yourself in a virtual environment with thousands of enterprise security leaders to discuss the latest cybersecurity trends and gain insights into security strategies and emerging cyber threats.
CISO Panel Discussion: Hear discussions between enterprise security executives as they examine ransomware threats and challenges.
Networking: Delegates can interact with speakers and sponsors, and visit networking lounges and sponsor booths.
Exclusive: Ransomware has emerged as the gravest digital threat to American businesses today with data extortion ransom payments doubling year-over-year, leading to a massive multi-million dollar wealth transfer from U.S. organizations to cyber criminal syndicates.
Resources: Access technical and strategy resources to help support your security management programs.
Be Heard: Share your insights by networking with thousands of attendees.
SecurityWeek Virtual Events Provide
Ransomware attacks and digital disruptions are faster, smarter, and more destructive than ever. Stay resilient in this new era of cyber risk by attending our in-depth virtual summit, where we'll bring you frontline insights and practical strategies from experts who know what it takes to stay protected. Learn how IT teams like yours must rethink their defenses for the new year, harden critical systems, and ensure rapid recovery when the unexpected strikes. Whether you're securing data, infrastructure, or all of the above, this is your chance to get ahead of emerging attacks.
Join our Field CISO, Dr. Joye Purser, to learn more about best practices for building resiliency, including her Recovery Must-Haves:
Dr. Joye Purser
Global Field CISO
Cohesity
Cloud threat intelligence should simplify detection—but often creates noise instead. With vast TI data and automated attacks flooding alerts, many teams struggle to separate real threats from background noise. This session introduces the Zero Noise Approach—a methodology for ingesting and operationalizing Cloud TI through attacker-based baselines, continuous feedback loops, and a “no alert left behind” mindset. Learn how this approach turns TI from overwhelming to actionable, with real-world case studies showing how organizations achieved higher fidelity detections and clearer visibility into attacker TTPs.
Yotam Meitar
Director, Cloud Response, Wiz
As AI reshapes the threat landscape, organizations must rethink how they protect against human-centric risk. This session explores how security leaders can strengthen their “human firewall” in the age of AI -- addressing emerging threats, modernizing security awareness programs for real-world behavior, and embedding security into everyday company culture. Attendees will learn practical strategies to boost user resilience and improve behavioral threat detection using Adaptive.
Brian Long
CEO & Co-founder
Adaptive Security
Please visit our sponsors in the Exhibit Hall. View resources and chat with their experts.
Attackers are no longer just "breaking in"; they are being "invited in" by unsuspecting users. Join our experts as we dive into the latest social engineering tactics, including brand impersonation and fake browser updates. Discover how AI has lowered the barrier to entry for cybercriminals, enabling them to spin up convincing phishing/social engineering sites and exploits in minutes to steal credentials and initiate the delivery of ransomware payloads.
Roslyn Rissler
Senior Manager of Cybersecurity Strategy, Menlo Security
Amelia Squires
Sr. Threat Intelligence Analyst, Menlo Security
Jonathan Lee
Principle Product Manager, Menlo Security
Unlike many other kinds of insurance, cyber insurance provides more than a reimbursement of expenses. From 24/7 claims support to expert, experienced, pre-vetted vendors to assist you in responding to an incident to recovery and setting you on the path to better resilience, your cyber insurance policy helps you respond to ransomware more quickly and effectively than trying to go it alone. This session will prepare you to get the most out of your policy when you really need it- and you likely will.
Monique Ferraro
Prof., Albany Law School, Independent Consultant
Drawing on real-world cases, leaked chats, and observed operations, this session explores what a modern ransomware syndicate actually looks like from the affiliate’s perspective: how access is acquired, how partnerships form and dissolve, how trust is negotiated without loyalty, and how operations move from initial intrusion to encryption and extortion.
Tammy Harper
Senior Threat Intelligence Researcher
Flare
Shifting the Paradigm from Vulnerable Backups to Invincible Recovery
The traditional "defense-in-depth" model is failing. In 2026, ransomware strains are designed with one primary goal: to find, compromise, and wipe out the backup infrastructure before the first file is even encrypted. If your backup can be seen, it can be killed.
It’s time to change the game. This session introduces Spherical Security - a departure from linear, layered defenses toward a holistic, 360-degree protection model. We will explore how to create a "Ransomware Deadlock" where attackers, even with administrative privileges, find themselves unable to delete, modify, or encrypt the recovery core.
We will deconstruct the architecture of an invincible repository by implementing the 3-2-1-1-0 Rule:
Attendees will gain a new perspective on data storage trends and a technical blueprint for building a recovery environment that doesn't just survive ransomware but makes it irrelevant.
Lukasz Nowatkowski
Cybersecurity Advocate
Xopero Software S.A.
We hope your virtual experience at SecurityWeek's 2026 Ransomware Resilience & Recovery Summit has been informative and productive. If you missed any sessions, you may watch them now on-demand in the Auditorium. We would like to take this opportunity to thank our sponsors: Cohesity, Wiz, Adaptive Security, and Menlo Security. Stop by their booths and chat with their experts before you leave!
A brief demo of Menlo Security HEAT Shield AI with Google Gemini
See how the Wiz Platform helps organizations protect everything they build and run in the cloud