Ransomware Resilience & Recovery Summit

2026 Ransomware Resilience & Recovery Summit

February 25, 2026 – Register

Register for Virtual Events

With ransomware attacks still hitting big-name victims across industries with ruthless efficiency, SecurityWeek’s 2026 Ransomware Resilience & Recovery Summit is a must-attend for cybersecurity professionals at companies large and small.

SecurityWeek’s Ransomware Resilience and Recovery Summit was designed to help businesses to plan, prepare, and recover from a ransomware incident.

Platinum Sponsor

Cohesity

 

Gold Sponsors

Adaptive Security

Menlo Security

Become a sponsor

This one-day virtual event will host robust discussion on the sometimes controversial strategies at the intersection of cybersecurity and corporate ethics, such as the dilemma of paying ransoms and the murky waters of negotiating with cybercriminals. Interactive panels will unpack real-world scenarios, evaluating the repercussions of ransom payment and exploring negotiation tactics with a lens on legal, financial, and reputational stakes.

The discourse aims to transcend beyond the theoretical, providing attendees with a nuanced understanding of ransom negotiation implications and fostering a space to cultivate more transparent and ethical response strategies.

Register for Event

time iconFebruary 25, 2026 11:00

Building Resilience: Best Practices from Cohesity

Ransomware attacks and digital disruptions are faster, smarter, and more destructive than ever. Stay resilient in this new era of cyber risk by attending our in-depth virtual summit, where we'll bring you frontline insights and practical strategies from experts who know what it takes to stay protected. Learn how IT teams like yours must rethink their defenses for the new year, harden critical systems, and ensure rapid recovery when the unexpected strikes. Whether you're securing data, infrastructure, or all of the above, this is your chance to get ahead of emerging attacks. 

Join our Field CISO, Dr. Joye Purser, to learn more about best practices for building resiliency, including her Recovery Must-Haves: 

  • Cyber Vault: An immutable, isolated, air-gapped, and secure copy of your backup data. Threat actors cannot access, change, or delete the files.
  • Digital Jump Bag: Light and contains quick-access items during a disaster. The Digital Jump Bag contains passcodes, keys, configurations, and other foundations that enable you to restore your crown jewels - or minimum viable company - following an incident.
  • Clean Room & Forensics: The “clean room” is an isolated environment with compartments for forensics, and for re-build/ restore activities. People and processes involving forensics - threat hunting and evidence collection - and other incident response activities - may be occurring in parallel to the Backup Team’s efforts to re-build in the face of ransomware. The Clean Room is compartmented to prevent leakage of malware or sensitive communications into places they shouldn’t be.
speaker headshot

Dr. Joye Purser
Global Field CISO
Cohesity

time iconFebruary 25, 2026 11:30

How to Leverage Cloud Threat Intelligence without Drowning: The Zero-Noise Approach

Cloud threat intelligence should simplify detection—but often creates noise instead. With vast TI data and automated attacks flooding alerts, many teams struggle to separate real threats from background noise. This session introduces the Zero Noise Approach—a methodology for ingesting and operationalizing Cloud TI through attacker-based baselines, continuous feedback loops, and a “no alert left behind” mindset. Learn how this approach turns TI from overwhelming to actionable, with real-world case studies showing how organizations achieved higher fidelity detections and clearer visibility into attacker TTPs.

speaker headshot

Yotam Meitar

Director, Cloud Response, Wiz

time iconFebruary 25, 2026 12:00

Strengthening the Human Firewall: Empowering Teams in the Age of AI

As AI reshapes the threat landscape, organizations must rethink how they protect against human-centric risk. This session explores how security leaders can strengthen their “human firewall” in the age of AI -- addressing emerging threats, modernizing security awareness programs for real-world behavior, and embedding security into everyday company culture. Attendees will learn practical strategies to boost user resilience and improve behavioral threat detection using Adaptive.

speaker headshot

Brian Long
CEO & Co-founder
Adaptive Security

time iconFebruary 25, 2026 12:30

BREAK

Please visit our sponsors in the Exhibit Hall. View resources and chat with their experts.

time iconFebruary 25, 2026 12:45

The New Face of Fraud: Social Engineering, AI, and the Path to Ransomware

Attackers are no longer just "breaking in"; they are being "invited in" by unsuspecting users. Join our experts as we dive into the latest social engineering tactics, including brand impersonation and fake browser updates. Discover how AI has lowered the barrier to entry for cybercriminals, enabling them to spin up convincing phishing/social engineering sites and exploits in minutes to steal credentials and initiate the delivery of ransomware payloads.

speaker headshot

Roslyn Rissler

Senior Manager of Cybersecurity Strategy, Menlo Security

speaker headshot

Amelia Squires

Sr. Threat Intelligence Analyst, Menlo Security

speaker headshot

Jonathan Lee

Principle Product Manager, Menlo Security

time iconFebruary 25, 2026 13:15

Cyber Insurance's Role in Ransomware Response and Recover

Unlike many other kinds of insurance, cyber insurance provides more than a reimbursement of expenses. From 24/7 claims support to expert, experienced, pre-vetted vendors to assist you in responding to an incident to recovery and setting you on the path to better resilience, your cyber insurance policy helps you respond to ransomware more quickly and effectively than trying to go it alone. This session will prepare you to get the most out of your policy when you really need it- and you likely will.

speaker headshot

Monique Ferraro

Prof., Albany Law School, Independent Consultant

time iconFebruary 25, 2026 13:45

Syndicate: Inside the Life of a Ransomware Affiliate

Drawing on real-world cases, leaked chats, and observed operations, this session explores what a modern ransomware syndicate actually looks like from the affiliate’s perspective: how access is acquired, how partnerships form and dissolve, how trust is negotiated without loyalty, and how operations move from initial intrusion to encryption and extortion.

speaker headshot

Tammy Harper
Senior Threat Intelligence Researcher
Flare

time iconFebruary 25, 2026 14:15

The Ransomware Deadlock: Rules of Spherical Security

Shifting the Paradigm from Vulnerable Backups to Invincible Recovery

The traditional "defense-in-depth" model is failing. In 2026, ransomware strains are designed with one primary goal: to find, compromise, and wipe out the backup infrastructure before the first file is even encrypted. If your backup can be seen, it can be killed.

It’s time to change the game. This session introduces Spherical Security - a departure from linear, layered defenses toward a holistic, 360-degree protection model. We will explore how to create a "Ransomware Deadlock" where attackers, even with administrative privileges, find themselves unable to delete, modify, or encrypt the recovery core.

We will deconstruct the architecture of an invincible repository by implementing the 3-2-1-1-0 Rule:

  • The Power of One (Immutability): Leveraging Single Write Repository logic and WORM (Write Once, Read Many) technology to ensure data stays unchangeable at the bit level.
  • The Modern AirGap: Beyond the "offline" myth—how to achieve logical and physical isolation that meets 2026’s recovery speed requirements.
  • The Zero-Point (Integrity): Why the "0" in 3-2-1-1-0 (zero errors through automated verification) is the most critical metric in a post-attack scenario.

Attendees will gain a new perspective on data storage trends and a technical blueprint for building a recovery environment that doesn't just survive ransomware but makes it irrelevant.

speaker headshot

Lukasz Nowatkowski
Cybersecurity Advocate
Xopero Software S.A.

time iconFebruary 25, 2026 14:45

Networking & Virtual Expo

We hope your virtual experience at SecurityWeek's 2026 Ransomware Resilience & Recovery Summit has been informative and productive. If you missed any sessions, you may watch them now on-demand in the Auditorium. We would like to take this opportunity to thank our sponsors: Cohesity, Wiz, Adaptive Security, and Menlo Security. Stop by their booths and chat with their experts before you leave!

Solutions Theater (On-demand)

time icon

[On-Demand] The Cohesity 5 Steps of Cyber Resilience

time icon

[On-Demand] Menlo Security HEAT Shield AI with Google Gemini

A brief demo of Menlo Security HEAT Shield AI with Google Gemini

time icon

[On-Demand] Wiz Demo

See how the Wiz Platform helps organizations protect everything they build and run in the cloud

time icon

[On-Demand] Exploring the Adaptive Security Platform

This one-day virtual event will feature sessions from malware researchers, threat hunters, law enforcement officers, legal and compliance practitioners, CISOs and defenders shining a spotlight on shadowy dynamics of ransomware attacks.

Expect a robust discussion on the sometimes controversial strategies at the intersection of cybersecurity and corporate ethics, such as the dilemma of paying ransoms and the murky waters of negotiating with cybercriminals. Interactive panels will unpack real-world scenarios, evaluating the repercussions of ransom payment and exploring negotiation tactics with a lens on legal, financial, and reputational stakes.

SESSIONS will provide defenders with actionable data and best known methods for successfully limiting exposure to – and damage from – ransomware data extortion attacks.

SPEAKERS at the event will include a mix of high-profile CISOs, threat-intelligence analysts, network defenders, government and law enforcement professionals, malware researchers and business and legal analysts.

The Call for Presentations/Papers (speakers) for SecurityWeek's Ransomware Resilience & Recovery Summit is open through January 9, 2026. (Submit early for increased chances of acceptance!)

This online event is expected to attract more than 1,500 attendee registrations from around the world.

Submit Your Speaking Idea Here!

Event Details
  • Start Date
    February 25, 2026 11:00 am

  • End Date
    February 25, 2026 3:00 pm