Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Virtual Event Today: Ransomware Resilience & Recovery Summit – Doors Are Open

Ransomware Resilience and Recovery Summit, presented by Palo Alto Networks

Ransomware Resilience and Recovery Summit, presented by Palo Alto Networks

The virtual doors are open and SecurityWeek’s Ransomware Resilience and Recovery Summit, presented by Palo Alto Networks, is now live! Register now and catch the first talk starting at 11:00AM ET.

This fully immersive 3D virtual event is designed to help businesses to plan, prepare, and recover from a ransomware incident.

See the agenda sessions below and login/register now to attend talks and visit the virtual expo hall.

Access Livestream

We hope you can join us for this exciting event!

CONFERENCE AGENDA – VIEW EVENT WEBSITE
11:00 AM ET – Mike Tyson and Ransomware: Planning for the Punch in the Face
 
11:30AM ET –  Keynote – Strategies for Ransomware Prevention and Resilience
 
12:15 PM ET – The Evolution of Ransomware: Methodology, Victimology, and What to Expect in 2022
 
1:00 PM ET – Automating and Responding to Incidents Can Be a Simple and Agile Process
 
1:00 PM ET – Getting Ahead of the Ransomware Operations Life Cycle
 
1:30 PM ET – CISO Panel: Solving the Ransomware Data-Extortion Crisis
• Brian Castagna – CISO, Seven Bridges Genomics
• Rich Friedberg – CISO, Live Oak Bank
• Matt Honea – Head of Security, SmartNews
 
2:15 PM ET – First Aid for Cyber Attacks
 
2:15 PM ET – How To Detect And Respond To A Ransomware Incident in a Complex Infrastructure
 
2:45PM ET – How do I Protect my Attack Surface?
 
3:15PM ET – Stopping Ransomware Attacks With AI
 
3:45 PM ET – Fireside Chat: Inside the Murky World of Ransomware Payment Negotiations – In this fireside chat, Coveware CEO Bill Siegel will shine the spotlight on the murky world of ransomware payment negotiations, share tense war stories of business discussions with cybercriminals, making cryptocurrency payments, and the realities of implementing data recovery and backup processes.
Presenting Sponsor
Platinum Sponsors
  
Abnormal Security
Gold Sponsors
  
  
  
Darktrace

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...