Thursday, September 28th, 2023

Tackling the Triple Threat of Ransomware, Data Breaches, and Extortion Attacks

18:00 – 20:30 BST | London, UK

Event Overview

Today’s enterprises face an unprecedented level of threat and complexity as they operate in the multi-cloud and digital world. Cybercriminals are employing new and creative ways to target organisations – such as triple extortion ransomware attacks, or weaponising technologies like generative AI to hack passwords, leak confidential information and bypass traditional endpoint detection and response tools.  

In this new environment, it is imperative that businesses bridge the gap between reactive firefighting and proactive planning and re-think their cybersecurity strategies to gain an upper hand on the frontline of virtual warfare.

Guided by insights from Richard Cassidy, EMEA CISO, Rubrik, this invitation-only roundtable will also draw upon the experiences of the attendees. Participants will discuss how to mitigate the risks that are threatening our digital landscape.

DISCUSSION POINTS

  • Understanding the intricacies and implications of ransomware attacks, data breaches, and cyber extortion on your organisation;
  • How to balance business agility with robust security;
  • How regulatory compliance can serve as a business enabler, rather than obstacle.

Moderator

Anna Delaney

Director, ISMG Productions

ISMG

Richard Cassidy

EMEA CISO

Rubrik

Speakers

Join ISMG’s Anna Delaney for a moderated discussion that will feature insight from Richard Cassidy, EMEA CISO, Rubrik. 

This session will be:

  • Chatham house rules
  • Peer driven
  • Pitch free

Exclusive Sneak Peek: Get a Preview of this Roundtable

Venue

The Ivy, Tower Bridge

One Tower Bridge, Tower Bridge Road, London, SE1 2AA

Underwritten by

Rubrik, the Zero Trust Data Security Company™, delivers data security and operational resilience for enterprises. Rubrik’s big idea is to provide data security and data protection on a single platform, including: Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery, and orchestrated application recovery. This means data is ready at all times so you can recover the data you need, and avoid paying a ransom. Because when you secure your data, you secure your applications, and you secure your business. Want to join us? Check http://rubrik.com/careers/ for openings. Follow us on Twitter at @rubrikInc.

Rules of Engagement

By taking part in this discussion you agree that:

  • These events follow Chatham House Rule. Nothing shared will be recorded or distributed anywhere online.
  • If for any reason you need to cancel your reservation, we ask you to let us know 48 hours prior to the event commencing so we can open your seat up to someone else.
  • These are interactive discussions, so we ask that all attendees participate in the discussion. If this is a virtual event, we ask all attendees to join via video.

Upcoming ISMG Events

January 16, 2025

AI-Driven Insights for Asset Visibility and Streamlined Patch Management

January 22, 2025

Mitigate Risks Through Asset Discovery and Compliance Monitoring

January 28, 2025

Are You Ready for DORA? Strengthening Resilience and Achieving Compliance by 2025

January 30, 2025

The Anatomy of Cyber Resilience: What It Is, What It Isn't, Why It Matters, and How to Achieve It

February 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

Upcoming ISMG Events

January 16, 2025

AI-Driven Insights for Asset Visibility and Streamlined Patch Management

January 22, 2025

Mitigate Risks Through Asset Discovery and Compliance Monitoring

January 28, 2025

Are You Ready for DORA? Strengthening Resilience and Achieving Compliance by 2025