InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

How Modern Ransomware Attacks Your Recovery Path - And What You Can Do About It Today

Presented by

Sabith Venkit, Recovery Resilience Architect, AWS & Naj Husain, CEO Elastio

About this talk

Register for our live panel discussion, or view on-demand after 1/29/26 Ransomware has changed. Today’s attacks are no longer defined by loud smash and grab events, but by quiet, deliberate corruption of data over time to compromise recovery paths. In this session, we’ll break down how modern ransomware compromises data often long before an attack is detected. We’ll explore why traditional security controls miss these behaviors, why “having backups” is no longer enough, and what AWS customers must do differently to protect their recovery paths. You’ll leave with a clear understanding of: - How ransomware silently compromises backup data - What signals indicate your recovery readiness is already be at risk - How AWS-native services and Elastio data integrity validation work together to reduce exposure
Elastio for Proven Ransomware Recovery

Elastio for Proven Ransomware Recovery

1393 subscribers10 talks
Elastio for Proven Ransomware Recovery
Elastio gives CISOs and CIOs certainty in their recovery strategy. As a cloud- and backup-agnostic solution, Elastio continuously validates that data is ready to recover, reducing downtime by over 90% and driving a 10–25x ROI. While traditional solutions protect data, Elastio automatically delivers a security control that proves proactive ransomware readiness.
Related topics