DON'T PAY THE RANSOM

Is your data safe from ransomware attacks? Hear from security leaders from both the private and public sectors to learn why network, perimeter, and application security isn’t enough. Learn about new cyber/ransomware threats,  how ransomware impacts every layer of your organization from board decisions to shareholder value, and how you can survive an attack without paying the ransom.

By viewing this video, you are providing your express consent that your viewing history has been captured and may be shared with our affiliates or third-party providers that may also combine with other data they collect about you, e.g. your use of their services. We and our third-party providers may use this information to present you with offers, promotions, or other marketing that we think you'll find relevant.

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

Join Nicole Perlroth, acclaimed reporter at The New York Times cybersecurity and author of “This is How They Tell Me the World Ends” and Bipul Sinha, Rubrik CEO, for a captivating fireside chat on emerging cybercrime and what you need to prioritize in order to fight back.

By viewing this video, you are providing your express consent that your viewing history has been captured and may be shared with our affiliates or third-party providers that may also combine with other data they collect about you, e.g. your use of their services. We and our third-party providers may use this information to present you with offers, promotions, or other marketing that we think you'll find relevant.

So You’ve been Hit by Ransomware. Now What?

The first 24 hours after a major security incident are critical. What can you do to protect your critical IT assets in the event of a ransomware attack? Hear Mandiant CEO, Kevin Mandia, and share best practices that IT leaders can put into practice today.

By viewing this video, you are providing your express consent that your viewing history has been captured and may be shared with our affiliates or third-party providers that may also combine with other data they collect about you, e.g. your use of their services. We and our third-party providers may use this information to present you with offers, promotions, or other marketing that we think you'll find relevant.

Holding your Board Hostage - How Ransomware is Impacting Board Discussions

We upack the candid dialogue that CISOs and Chief Risk Officers are having with their Board of Directors about ransomware. This panel will discuss how its impacting Board interactions, cyber insurance and coverage, and cyber resiliency as part of their overall risk management strategy.

By viewing this video, you are providing your express consent that your viewing history has been captured and may be shared with our affiliates or third-party providers that may also combine with other data they collect about you, e.g. your use of their services. We and our third-party providers may use this information to present you with offers, promotions, or other marketing that we think you'll find relevant.

What Goes Into a Ransomware Recovery Plan?

Does your organization have a recovery plan? Jon Friedman, Senior Consultant at AimPoint, provides the inputs of a comprehensive ransomware recovery. He’ll suggest best practices in key areas such as preparation, investigation, containment, and recovery.

By viewing this video, you are providing your express consent that your viewing history has been captured and may be shared with our affiliates or third-party providers that may also combine with other data they collect about you, e.g. your use of their services. We and our third-party providers may use this information to present you with offers, promotions, or other marketing that we think you'll find relevant.

Rubrik x Palo Alto Networks: Stay One Step Ahead with Automated Ransomware Response

When ransomware strikes, responding appropriately means you need the right tools and personnel. Enabling your IT, SecOps and Incident Response teams to quickly respond is critical. Rubrik and Palo Alto Networks have partnered to standardize and accelerate the post-intrusion response processes.

MEET OUR SPEAKERS

Chris Krebs

CHRIS KREBS

FORMER DIRECTOR, CISA

CISA
Bipul Sinha

SUZETTE KENT

FORMER FEDERAL CIO, CEO KENT ADIVSORY SERVICES 

Kevin Mandia

KEVIN MANDIA

CEO, MANDIANT

FireEye Logo
Rishi Bhargarva

NICOLE PERLROTH

AWARD WINNING CYBERSECURITY JOURNALIST, THE NEW YORK TIMES

Bipul Sinha

BIPUL SINHA

CEO & CO-FOUNDER

 

Rubrik
Jon Friedman

RISHI BHARGAVA

VP PRODUCT STRATEGY

 

Palo Alto Networks Logo
Mike Tornicasa

TYLER BRYSON 

CVP OF GLOBAL PARTNER SOLUTIONS, US

Palo Alto Networks Logo
David Siles

JP CALDERON

SVP & CISO

 

PVH Corporation
Don Clewley

DON CLEWLEY

FORMER CHIEF RISK OFFICER

Rubrik
Mike Tornicasa

MIKE TORNINCASA

GM, SAAS APPS

Rubrik
Jon Friedman

JON FRIEDMAN

SENIOR CONSULTANT

AimPoint Group
Rama

RAMA NAAGESWARAN

VP OF PRODUCT

Rubrik
David Siles

RON PLESCO

PARTNER, DLA PIPER

Rubrik
David Siles

DAVID SILES

GLOBAL FIELD CTO

Rubrik
Rishi Bhargarva

MATTHEW DAY

CIO, LANGS BUILDING SUPPLIES

FireEye Logo
Rishi Bhargarva

JEFF PHELAN

PUBLIC SECTOR CTO, RUBRIK

Rubrik