How to Be Ready for Ransomware

August 18, 2022
11:00 AM – 5:00 PM EST | 8:00 AM – 2:00 PM PST

You thought it was bad before?

You may wish for the days when ransomware attackers just used some malware, encrypted data, and asked you for Bitcoin. Supply chain attacks, doxing and blackmail threats, intellectual property theft, and inventive ransom requests that have deep business consequences, are now part and parcel of the attacker toolbox. How are IT leaders supposed to prepare for such complex threats?

In this virtual event, presented by ITPro Today and InformationWeek, get a better picture of today’s threat landscape; learn what tools and techniques can best help your organization detect and prevent these attacks; design a thorough incident response plan that will help your organization survive a successful attack intact; and be prepared with a fast answer to the age-old question: “to pay or not to pay?”

Topics Include:
Defense strategies and skills
Identifying and avoiding insider threats
Understanding today’s threat landscape
11:00 AM – 11:45 AM

How to Prevent Ransomware Attacks

Sponsored by: Fortinet
Presented by: Curtis Franklin, Omdia Sr. Analyst, Security Operations

Sad but true: new ransomware attack tactics mean your current backup and restore strategy may no longer suffice. Cyber resilience now requires intelligence and agility—in the backup process, in intrusion and malware detection, and in rapidly learning (and applying) lessons from successful intrusions. This keynote from Curtis Franklin, Omdia’s Security Operations senior analyst, will teach you how to stay one step ahead of increasingly sophisticated threat actors.

Fireside chat
11:45 AM –12:00 PM

Sponsored by: Fortinet
Moderated by: Steve Hill
Panelists: Tony Giandomenico, Sr. Director, Cyber-Security Consulting, Proactive & Reactive Services & Karin Shopen Bar, Cybersecurity Strategy, Product Marketing, Fortinet

Fireside chat with Fortinet

12:15 PM – 1:00 PM

You’ve Been Attacked. Now What?

Sponsored by: Mandiant
Presented by: Brien Posey, Technical Writer & Microsoft MVP

Sooner or later, your business will fall prey to a ransomware attack—then what? Fortunately, there are tried-and-true tactics for recovering from these attacks. In this action-packed keynote, we’ll cover how to handle a ransomware attack from start to finish, including how to develop an incident recovery plan, the latest in data backup and restoration, and how a list of internal and external contacts can expedite recovery.

Fireside Chat
1:00 PM – 1:15 PM

Sponsored by: Mandiant
Moderated by: Steve Hill
Panelists: David Wong, VP, Mandiant Consulting – Americas

Fireside Chat with Mandiant

Premier Session
1:30 PM – 2:00 PM

Ransomware 3.0: We Thought It Was Bad - and Then It Got Even Worse

Sponsored by: KnowBe4
Presented by: Roger A. Grimes, Data-Driven Defense Evangelist at KnowBe4

We thought it was bad enough when traditional ransomware started to steal data in its second generation of evolution, now dubbed “double extortion”. The third stage of ransomware is beginning to happen now and will make us wish for the good, old days of Ransomware 2.0.

Attend this presentation to learn how ransomware is evolving to inflict maximum damage and more importantly how to protect yourself and your organization.

Roger A. Grimes, Data-Driven Defense Evangelist at KnowBe4, was among the first to warn the world about Ransomware 2.0 – the almost accidental attacks that became a storm.

Here is his latest early warning.

In this webinar you’ll learn:

  • How ransomware is evolving beyond double extortion, what’s coming next
  • The likely end-state of ransomware and how it will extract maximum value from each victim
  • Proven best practice defenses that you need to follow to avoid becoming a victim
  • How to empower your users to be the best, last line of defense when everything else fails

Don’t become another statistic. Stay one step ahead of cybercriminals!

Premier Session
1:30 PM – 2:00 PM

Is Artificial Intelligence and Machine Learning the future of cybersecurity?

Sponsored by: Mimecast
Presented by: Brian Pinnock, Mimecast Cybersecurity Expert

46% of organizations have already deployed artificial intelligence (AI) and machine learning (ML) technologies to bolster cybersecurity. Yet, are they using AI and ML in the most effective ways?

Join this webinar with Brian Pinnock, Mimecast Cybersecurity Expert to explore:

* Why organizations are using or plan to use AI and ML

* How AI and ML reduce stress on limited resources, and

* How threat actors are increasingly using AI and ML for sophisticated attacks like ransomware

Spotlight Custom Webinar
2:15 PM – 2:45 PM

Augment Your Team with Ransomware Experts

Sponsored by: Fortinet
Presented by: Tony Giandomenico, Sr. Director, Cyber-Security Consulting, Proactive & Reactive Services & Karin Shopen Bar, Cybersecurity Strategy, Product Marketing, Fortinet
Premier Session
2:45 PM – 3:15 PM

Protecting Your Business Lifeblood – Your Data

Sponsored by: Clumio
Presented by: Joe Ferguson, Cloud Sales Engineer & Glenn Mulvaney, VP, Cloud Security, Clumio

A ransomware event takes place every 11 seconds. In 2021, 68% of US organizations paid the ransom, but only 65% got their data back. Learn how you can avoid adding to that statistic, and along the way protect against accidental deletion and insider threats. Understand best practices illustrated with real world customer examples.

Premier Session
2:45 PM – 3:15 PM

Rapid Ransomware Recovery with True Continuous Data Protection

Sponsored by: Zerto
Presented by: Chris Rogers, Technology Evangelist, Zerto

Ransomware is the biggest threat to all organizations of every size and every industry. The frequency and severity of attacks is ever increasing and the unprepared are paying ransoms of millions and ending up in the news. It is vital to understand how your organization can recover rapidly from any attack to avoid disruption without paying a ransom.

Join Chris Rogers from Zerto, a Hewlett Packard Enterprise company to learn more about:

  •  Ransomware attack scenarios and how they cause downtime and data loss at different scales
  •  Why recovery point objective and recovery time objective are crucial in a ransomware attack
  • The types of recovery needed to recover your VMware infrastructure, including: files, whole application stacks, entire data centers, and even multiple sites after an attack
  • How you can use best-in-class Zerto continuous data protection to beat ransomware every time
  • How you can Get Out of Ransomware Jail With Zerto Free Edition
Spotlight Custom Webinar
3:30 PM – 4:00 PM

Ransomware: New Attacker TTPs and Recovery Strategies for Security Teams

Sponsored by: Mandiant
Presented by: Greg Blaum and Jared Kunkel, Principal Consultants, Mandiant
Panel Discussion
4:15 PM – 5:00 PM

Should You Pay?

Sponsored by: AttackIQ, Rubrik
Moderated by: Steve Hill
Panelists: John Pironti, President, IP Architects, LLC; Jonathan Reiber, VP for Cybersecurity Strategy and Policy, AttackIQ; David Siles, Global Field CISO, Rubrik

The FBI discourages organizations from paying ransoms, but many victims end up doing so, especially when the costs of a prolonged attack stand to outweigh the ransom amount. Whether to pay or not depends on a number of complex factors. Listen as our panel of security experts discuss the risks of paying, how paying impacts organizations, and the best ways to prevent ransomware attacks to begin with.

How to Be Ready for Ransomware
August 18, 2022
11:00 AM – 5:00 PM EST | 8:00 AM – 2:00 PM PST
Chris Rogers_Zerto
Chris Rogers
Technology Evangelist, Zerto
Chris Rogers is a Technology Evangelist at Zerto with 11 years of experience as an IT Professional focusing on data center virtualization and Data Protection. Chris is passionate about helping organizations remain resilient and running amidst cybersecurity threats like ransomware.
David Siles
David Siles
Global Field CISO, Rubrik
David is the Global Field CISO for Rubrik working with enterprise customers and global partners on leveraging the Rubrik Data Security platform to drive their cyber resiliency and digital transformations forward. Previously, he served as the Vice President of Data Classification & Workload Security for HyTrust.
Roger Grimes of KnowBe4
Roger Grimes
Data-Driven Defense Evangelist, KnowBe4
Roger A. Grimes is a 30-year computer security professional, author of 13 books and over 1,200 national magazine articles. He frequently consults with the world’s largest and smallest companies, and militaries, and he has seen what does and doesn’t work. Roger is known for his often contrarian, fact-filled viewpoints.
David Wong
David Wong
Vice President, Mandiant Consulting
Dave is a Vice President on the Mandiant Consulting team. He helps Mandiant customers prepare and respond to security incidents and has been with the company for over 6 years. He has helped dozens of companies, large and small, navigate through cyber security incidents.
Jonathan Reiber
Jonathan Reiber
VP, Cybersecurity Strategy and Policy, Rubrik
Jonathan Reiber is VPfor Cybersecurity Strategy & Policy at AttackIQ, where he directs key strategic issues in research and analysis, communications, and security planning. During the Obama administration he served as Speechwriter and Chief Strategy Officer for Cyber Policy in the Office of the Secretary of Defense.
Glenn Mulvaney
Glenn Mulvaney
VP, Cloud Security, Clumio
Glenn is an experienced technology leader with a 20-year history in Silicon Valley start-ups. Prior to joining Clumio, Glenn was Vice President of Operations at Inscape Data, Inc. and Skyhigh Networks, Inc. (acquired by McAfee, Inc., in January 2018) as Vice President of Operations.
Karin Shopen
Karin Shopen Bar
Cybersecurity Strategy, Product Marketing, Fortinet
Leading Product Marketing for the Fortinet's FortiGuard portfolio, including FortiGuard Labs, FortiGuard AI-Powered Security Services and FortiGuard Consulting and IR Services. Passionate about building trust in technology to support the creation of secure and safe connections between people and systems to facilitate innovation and growth.
Tony Giandomenico
Tony Giandomenico
Sr. Director, Cyber-Security Consulting, Proactive & Reactive Services, Fortinet
Tony Giandomenico has 30 years of comprehensive experience as an Executive, Entrepreneur, Mentor and Security Consultant for companies within information security across all industries. In his current position at Fortinet, he is responsible for all aspects of the FortiGuard Security Consulting services.
Joe Ferguson headshot
Joe Ferguson
Cloud Sales Engineer, Clumio
Joe Ferguson has 20 years of experience designing well architected storage and backup solutions for customers. Focused on emerging and disruptive technologies, he has helped build market leaders such as Data Domain, Pure Storage and now Clumio.
John Pironti
President, IP Architects, LLC
John P. Pironti is the President of IP Architects, LLC. He actively advises on and develops information technology strategy and has designed and implemented enterprise-wide electronic business solutions, information risk management and security and cybersecurity strategies and programs.
Curt Franklin
Curtis Franklin
Senior Analyst, Security Operations, Enterprise Security Management
Curtis Franklin Jr. is Senior Analyst at Omdia, focusing on enterprise security management. Curtis has been writing about technologies and products in computing and networking since the early 1980s. Previously, he was senior editor of Dark Reading, editor of Light Reading's Security Now and executive editor, technology, at InformationWeek.
Brien Posey
Brien Posey
Technical Writer & Microsoft MVP
As an international best-selling technology author and 18-time Microsoft MVP, Brien Posey has written or contributed to dozens of books, and created numerous video training courses on a variety of IT and space-related topics.

Prizes & Interaction

Attend on August 18, 2022 and Win!
The more you participate, the more points you earn! It’s that simple. You’ll earn prize points for each activity you participate in throughout the virtual conference. Points will be calculated at the end of the live event day.
*Giveaways are limited to North American residents only. Winners are limited to one prize per calendar year for Informa Tech sponsored events.
Explorer Giveaway

30 Points

Session Views

25 Points

Zone Visits

20 Points

Chats Attended

10 Points

Resources Viewed

5 Points

vCards Exchanged

© 2022 Informa USA, Inc., All Rights Reserved | Privacy Policy | Terms of Service

How to Be Ready for Ransomware