__CONFIG_colors_palette__{"active_palette":0,"config":{"colors":{"40b6d":{"name":"Main Accent","parent":-1},"9f3b6":{"name":"Main Accent Transparent","parent":"40b6d","lock":{"saturation":0,"lightness":1}}},"gradients":[]},"palettes":[{"name":"Default","value":{"colors":{"40b6d":{"val":"var(--tcb-skin-color-0)"},"9f3b6":{"val":"rgba(56, 146, 229, 0.25)","hsl_parent_dependency":{"h":209,"l":0.56,"s":0.77}}},"gradients":[]},"original":{"colors":{"40b6d":{"val":"rgb(55, 179, 233)","hsl":{"h":198,"s":0.8,"l":0.56,"a":1}},"9f3b6":{"val":"rgba(55, 180, 233, 0.25)","hsl_parent_dependency":{"h":197,"s":0.8,"l":0.56,"a":0.25}}},"gradients":[]}}]}__CONFIG_colors_palette__

 WAIT CAN'T MAKE ALL OF THE EXPERT SESSIONS?

Get the all-access pass to view summit recordings plus over $1,250 in exclusive bonuses and you are guaranteed to not miss a thing...

Only $147

Schedule of Events

Ransomware Live 2021 is going to be two days packed full of security stories, strategies, and tips to help you avoid falling prey. You don't want to miss anything.  Here's a quick look at what is lined up. 

Thursday, July 29


John Kindervag

Creator of Zero Trust

Zero Trust Principles - Keynote

Thursday, July 29 | 10:15 AM EST

Kindervag's keynote presentation will address Zero Trust and what organizations must be doing to adopt this methodology. 

John Kindervag

Creator of Zero Trust

John Kindervag

Creator of Zero Trust

Ransomware Elementary

Thursday, July 29 | 11:15 AM EST

Kindervag's keynote presentation will address Zero Trust and what organizations must be doing to adopt this methodology. 

Brian Cyprian

FBI Agent - Cyber

FBI Ransomware Brief

Thursday, July 29 | 12:30 PM EST

Kindervag's keynote presentation will address Zero Trust and what organizations must be doing to adopt this methodology. 

The State of Ransomware in 2021 - Panel 

Thursday, July 29 | 1:45 PM EST

Stephen Ramey

Director of Incident Response - Arete Cyber

Jordan Fischer

Director of Incident Response - Arete Cyber

Ted Demiopolus

Director of Incident Response - Arete Cyber

E.J Hilbert

Director of Incident Response - Arete Cyber

The Global Privacy, Security and Technology Legal Landscape in Breach Response

Thursday, July 29 | 2:45 PM EST

This presentation will provide an overview of the changing legal landscape in security, privacy, and technology from both a domestic and global landscape. We will discuss the importance of understanding and preparing for incident response and management to mitigate risks and liability. Further, we will discuss the importance of creating right-sized compliance programs that help to mitigate risk in security and privacy on an on-going basis.

Jordan Fischer

Cybersecurity Attorney

Real Life Stories About How Companies Got Hacked

Thursday, July 29 | 3:45 PM EST

Kindervag's keynote presentation will address Zero Trust and what organizations must be doing to adopt this methodology. 

Gabriel Friedlander

Founder - Wizer Training

Friday, July 30


Zero Trust - Keynote

Friday, July 30 | 10:15 AM EST

Kindervag's keynote presentation will address Zero Trust and what organizations must be doing to adopt this methodology. 

Dr. Chase Cunningham

Director of Incident Response - Arete Cyber

Ransomware Impacts In Healthcare

Friday, July 30 | 11:15 AM EST

Healthcare organizations have been known as an especially lucrative cyberattack target for years. The extensive information contained in medical records combined with the broad scope of systems involved creates plenty of incentives for the criminals. The potential impact to patient safety creates a perfect storm that makes these attacks lucrative opportunities simply because victims may have no choice other than to pay the ransom. For years, the locked systems alone have been enough to make healthcare a frequent victim but adding the new release of all of that data means the victims really have to make a decision no one wants to face. Patient care is impacted in many ways during a single attack. The disclosure of exfiltrated information also triggers the legal obligation organizations have to protect the privacy of patient records. Understanding the scope of these attacks is important for organizations as well as patients.

Donna Grindle

Kardon Compliance

David Sims

Security First IT

Ransomware - Who's To Blame

Friday, July 30 | 12:30 PM EST

The world is all of a sudden talking about ransomware despite it having been around for over a decade. Why? Are the bad guys somehow better or are these attacks the result of failures by others. Here's a hint- its not the bad guys causing this issue. In this talk we will discuss the evolution of ransomware and the business behind it. We will then cover who is responsible for the dramatic uptick in recent attacks. Namely, why is a 10-20 yr old problem in the forefront of worldwide news about cyber security. Responsibility is not always on those who exploit the weakness.

E.J. Hilbert

Former FBI Cyber Investigator - Founder KCE Cyber

Managing Your Attack Surface To Prevent Ransomware

Friday, July 30 | 1:15 PM EST

There are a number of vectors ransomware can take to access a computer. One of the most common delivery systems is phishing spam — attachments that come to the victim in an email, masquerading as a file they should trust. Some other, more aggressive forms of ransomware, like NotPetya, exploit security holes to infect computers without needing to trick users. Hackers target their victims opportunistically by gathering information on their potential victims using information gathered openly on the web or via more obscure information sold on the black market (from data breaches for example).

Marc Castejon

Silentbreach

Should We Stop Ransom Payments? - Panel 

Thursday, July 29 | 1:45 PM EST

Stephen Ramey

Director of Incident Response - Arete Cyber

Jordan Fischer

Director of Incident Response - Arete Cyber

Superbad: Not McLovin Ransomware

Friday, July 30 | 2:45 PM EST

Ransomware is a serious threat to businesses of all sizes. Threat actors within the ransomware crime circles have demonstrated advanced tactics and adaption to security defenses over the last several years. No business is immune to the threat but each business can take steps to mitigate the success of a cyber attack. Join Stephen Ramey, Director of Incident Response at Arete IR, as he discusses the tactics used by ransomware threat actors and recommendations to mitigate the success of an attack.

Stephen Ramey

Director of Incident Response - Arete Cyber

Resilience: Surviving Ransomware, Pandemics, and Other Highly Disruptive Events

Friday, July 30 | 1:15 PM EST

One of the few guarantees in life is that we will encounter disruptive events. Two recent examples include the current ongoing scourge of ransomware and the (hopefully waning) pandemic. Both have caused and are causing enormous damages. Some organizations weather these storms far better than others. Although ransomware is relatively new, highly disruptive events and techniques to protect against them are not. We can learn a lot about ransomware by looking at how successful organizations have handled other highly disruptive events. What are the characteristics of organizations that survive these events with minimal damage, whether ransomware or other nasty occurrences? And what are the characteristics of those that have significant damage or in some case don’t even survive?

Ted Demiopolus

Director of Incident Response - Arete Cyber

Coming Soon

Friday, July 30 | 1:15 PM EST

Coming Soon

Ted Demiopolus

Director of Incident Response - Arete Cyber