Trellix Xpand Logo

Ransomware Detection & Response Virtual Summit

Watch On-Demand

At the Trellix Ransomware Detection & Response Virtual Summit, you will:

Come away confident that you can protect your organization.
Uncover the step-by step anatomy of a ransomware attack.
See the latest innovations in threat detection and response.
Get practical takeaways to reduce mean time to detect (MTTD) and respond (MTTR).


Missed the Ransomware Detection & Response Virtual Summit?
Watch the virtual summit on-demand.


AWS Logo


Ryan J. Leszczynski
Ryan J. Leszczynski

Supervisory Special Agent
FBI, Cyber Division

Sami Khoury
Sami Khoury

Head of the Canadian Centre
for Cyber Security

Jesse Netz
Peter Neuhauser

Division Manager CERT-BA
Network and Security Services
Bundesagentur für Arbeit 

Bryan Palma
Bryan Palma


Harold Rivas
Harold Rivas


John Morgan
John Morgan

XDR General Manager

John Fokker
John Fokker

Head of Threat Intelligence
Trellix Advanced Research Center


Welcome and Opening Remarks

Lessons from the Ransomware Front Lines
Ryan J. Leszczynski - Supervisory Special Agent, FBI, Cyber Division

Gain real-world insights from an FBI special agent, on lessons learned in detecting and responding to ransomware attacks and stopping cyber criminals.

Anatomy of a Ransomware Attack
John Fokker - Head of Threat Intelligence, Trellix Advanced Research Center

Uncover the step-by-step path of a ransomware attack with a renowned threat intelligence expert, and learn how to accelerate detection and response.

Accelerate Ransomware Detection and Response with Trellix's AI-Powered Platform and XDR

Watch a demo of how Trellix's comprehensive, open, AI-powered platform and XDR detects and responds to ransomware faster, minimizing MTTD and MTTR.

Bolster Cybersecurity: CISOs Panel Discussion
Sami Khoury - Head of the Canadian Centre for Cyber Security
Peter Neuhauser - Division Manager CERT-BA, Network and Security Services, Bundesagentur für Arbeit 
Harold Rivas - Trellix CISO

Learn from cybersecurity leaders and CISOs in a panel discussion on best practices to bolster cybersecurity.

Closing Remarks