InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Cloud Native Tools Aren't Enough: Cyber Recovery for Your Application-Dependent Unstructured Data

Presented by

Matt Castriotta: Field CTO, Cloud GTM, Rubrik

About this talk

Your S3 buckets, EFS volumes, and Azure Blob storage are growing exponentially. Your business-critical applications – from data analytics to AI/ML pipelines – depend on this unstructured data. But here's the problem: the cloud-native backup tools you're relying on today won't save you when sophisticated attackers strike. Recent attacks like Codefinger have shown how easily ransomware can disable S3 versioning and purge backup history. Geographic replication fails when attackers compromise shared authentication systems. And snapshots stored in production environments become just another target for deletion. This isn't theoretical. Organizations are discovering these limitations during actual attacks – when it's too late. The result? Recovery processes that take weeks instead of hours, with no guarantee that restored data won't reintroduce dormant threats. In this session, you'll discover: Why traditional protection methods fail – Real-world case studies showing how attackers bypass versioning, replication, and snapshots The hidden scope of data sprawl – How unstructured data across multi-cloud environments creates visibility blind spots that attackers exploit What cyber recovery actually means – The fundamental difference between operational recovery and protection against sophisticated threats Technical architecture for resilience – How to implement immutable, air-gapped protection that can't be compromised Practical recovery strategies – Moving from "hoping your backup works" to confident, threat-free recovery at scale
Rubrik

Rubrik

21679 subscribers142 talks
Zero Trust Data Management Webcasts For IT Professionals
What is Zero Trust Data Management? An estimated 2 out of 3 ransomware attacks now target backups. That’s why it’s vital to ensure your backups are 100% protected and resilient. With zero trust data management no one is trustworthy. No user. No application. No device. To meet this new standard, data must be natively immutable so that it can never be modified, encrypted, or deleted by ransomware. Data needs to be ready at all times so you can recover what you need, and never pay a ransom.
Related topics