Thursday, September 28th, 2023

Tackling the Triple Threat of Ransomware, Data Breaches, and Extortion Attacks

18:00 – 20:30 BST | London, UK

Event Overview

Today’s enterprises face an unprecedented level of threat and complexity as they operate in the multi-cloud and digital world. Cybercriminals are employing new and creative ways to target organisations – such as triple extortion ransomware attacks, or weaponising technologies like generative AI to hack passwords, leak confidential information and bypass traditional endpoint detection and response tools.  

In this new environment, it is imperative that businesses bridge the gap between reactive firefighting and proactive planning and re-think their cybersecurity strategies to gain an upper hand on the frontline of virtual warfare.

Guided by insights from Richard Cassidy, EMEA CISO, Rubrik, this invitation-only roundtable will also draw upon the experiences of the attendees. Participants will discuss how to mitigate the risks that are threatening our digital landscape.

DISCUSSION POINTS

  • Understanding the intricacies and implications of ransomware attacks, data breaches, and cyber extortion on your organisation;
  • How to balance business agility with robust security;
  • How regulatory compliance can serve as a business enabler, rather than obstacle.

Moderator

Anna Delaney

Director, ISMG Productions

ISMG

Richard Cassidy

EMEA CISO

Rubrik

Speakers

Join ISMG’s Anna Delaney for a moderated discussion that will feature insight from Richard Cassidy, EMEA CISO, Rubrik. 

This session will be:

  • Chatham house rules
  • Peer driven
  • Pitch free

Exclusive Sneak Peek: Get a Preview of this Roundtable

Venue

The Ivy, Tower Bridge

One Tower Bridge, Tower Bridge Road, London, SE1 2AA

Underwritten by

Rubrik, the Zero Trust Data Security Company™, delivers data security and operational resilience for enterprises. Rubrik’s big idea is to provide data security and data protection on a single platform, including: Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery, and orchestrated application recovery. This means data is ready at all times so you can recover the data you need, and avoid paying a ransom. Because when you secure your data, you secure your applications, and you secure your business. Want to join us? Check http://rubrik.com/careers/ for openings. Follow us on Twitter at @rubrikInc.

Rules of Engagement

By taking part in this discussion you agree that:

  • These events follow Chatham House Rule. Nothing shared will be recorded or distributed anywhere online.
  • If for any reason you need to cancel your reservation, we ask you to let us know 48 hours prior to the event commencing so we can open your seat up to someone else.
  • These are interactive discussions, so we ask that all attendees participate in the discussion. If this is a virtual event, we ask all attendees to join via video.

Upcoming ISMG Events

June 5, 2025

AI-Driven Advantage: Streamlined Operations, Loyal Customers

June 10, 2025

Hybrid Identity Under Siege: Defending AD & Cloud-Based Identity

June 12, 2025

AI Security Imperatives: Protecting Your Enterprise in the Age of GenAI

June 18, 2025

Threat Exposure Management: How Do You Prioritize Vulnerabilities?

June 19, 2025

Building Next-Gen Applications with Serverless: Accelerating Development for Data-Intensive Workloads

Upcoming ISMG Events

June 5, 2025

AI-Driven Advantage: Streamlined Operations, Loyal Customers

June 10, 2025

Hybrid Identity Under Siege: Defending AD & Cloud-Based Identity

June 12, 2025

AI Security Imperatives: Protecting Your Enterprise in the Age of GenAI