Ransomware attacks aren't always random acts of crime carried out by individuals or isolated groups. Oftentimes, ransomware is a business, complete with recruitment strategies, compensation models, and even IT support. These organizations can trade strategies, continually update their approaches, and offer as-service-software to scale their operations.

Given that context, it should come as no surprise that the average amount that attackers demanded in 2021 went up by 144% and the average payment went up 78%.

To win the fight against ransomware, businesses and IT and security professionals need to be just as connected and sophisticated as the people attacking them.

On September 14, 2022, Rubrik is bringing together the best and brightest in cybersecurity for Data Security Summit, a free, two-hour event that will help you arm your organization against cyber attacks. 

Read on for five reasons Data Security Summit stands out from other cybersecurity events and why you’ll want to register today.

A guest list to get excited about

This isn't your run-of-the-mill event with a few security experts. Data Security Summit is a tightly packed, best-practices-rich symposium featuring today’s brightest security minds. Let’s talk about just a few of them.

Former Director of the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) Chris Krebs and Eric Goldstein, Executive Assistant Director at CISA, will brief you on the state of security today, emerging trends, and what you can do about them.

Former CISO at the CIA and Rubrik’s current CISO, Michael Mestrovich, and Director of Cybercrime at Interpol Craig Jones will share their perspectives as former and current global data defenders and how the public, private, and enforcement sectors can share information to combat cybercrime.

But these folks are just the beginning! For the complete speakers list, click here.

Practical advice with a sports twist

The folks on Data Security Summit’s stellar lineup will give you practical, implement-them-now tips to establish a modern, zero trust architecture that combines infrastructure security, perimeter security, and data security. But there are a couple sessions that will especially appeal to sports fans.

Kim Rometo, SVP and CITO of the Atlanta Hawks, and Russ Trainor, SVP IT and CIO of the Denver Broncos, will discuss how they approach protecting their teams’ data.

And Christian Horner, Team Principal and CEO at Oracle Redbull Racing, will discuss how his team uses data in a sport where success is measured in fractions of a second.

Data security + infrastructure security is a winning combo, and we’ll show you why

People often think perimeter security and infrastructure security are enough. But despite heavy investments in both, cybercriminals can still get in and hold data for ransom. Data security is critical to a well-rounded security strategy. To better protect your data and your business, it needs to be a priority. 

Each of Data Security Summit’s sessions will discuss the importance of data security and how to achieve a well-rounded security posture that pairs it with perimeter security and infrastructure security.

Learn how to secure your cloud environment

Cloud architects, this one’s for you. You need to enable the business with the right technology, but that technology also needs to be secure. Nobody needs to tell you how complicated that can be, especially when you’re dealing with hybrid and multicloud environments.

Check out “A Holistic Cybersecurity Approach: Why Cloud + Data Security Must Come Together” with Shawn Bice, Microsoft’s Corporate Vice President, Cloud Security, and Rubrik CEO Bipul Sinha for a discussion on cloud security and this unique balancing act.

Get inside the minds of cyber criminals   

No one is immune from cyber crime. But like gambling in Las Vegas or predicting traffic, humans tend to believe they’re the exception to the rule rather than prepare for bad, albeit more realistic, scenarios. Cyber criminals know and use this information to prey on businesses who assume the best.

That’s why an “assume breach” mentality (You’ve heard this one before, but it bears repeating!) is critical to understanding the nature of the cyber attacks and being prepared to recover at a moment’s notice.

Tune in to “Cyber Minds: What Keeps the World’s Top Security Leaders Up at Night” to hear from author, Cybersecurity Influencer, and Executive Shira Rubinoff on how teams can better collaborate in the fight against ransomware, how to develop the next generation of IT and security talent, and more. 

Bonus reason: It’s totally free! 

In other words: You’ve got nothing to lose and everything to gain. Register here to reserve your spot.