82% of cyberattacks now target cloud environments, where your critical application and AI data reside. When yours gets hit, every second counts.
Join IT and security leaders who've turned worst-case scenarios into minor incidents. Discover the strategies that separate companies that bounce back in hours from those that stay down for weeks.
Your cloud is already a target—and AI is multiplying the risk.
Cloud breaches are now the norm, not the exception. AI operations just gave attackers more entry points—repositories, training data, model storage, agent deployment. Learn how Rubrik secure the entire pipeline, not just pieces of it. |
|
Shift your strategy from defense to resilience.
Move beyond prevention-only tactics and adopt the modern "assume breach" mindset that security and business leaders are embracing. |
Hear directly from peers.
Learn from leading organizations about their real-world journey to cloud cyber resilience—what worked, what didn’t, and what they’d do differently as AI transforms both attacks and recovery. |
|
Gain confidence in your cloud recovery plan.
Understand how to build a strategy that not only protects your data but also ensures you can restore business operations rapidly and minimize financial impact. |
Rubrik Cloud Resilience Summit | December 10, 2025
Turn cloud breaches into business as usual. Discover how to protect your data, recover faster, and build resilience at Rubrik’s 2025 Cloud Resil... See more
Rubrik Cloud Resilience Summit | December 10, 2025
Turn cloud breaches into business as usual. Discover how to protect your data, recover faster, and build resilience at Rubrik’s 2025 Cloud Resil... See more
Cloud attacks don't follow the playbook you're used to. Attackers compromise credentials, escalate privileges through legitimate tools, and move across your environment in ways that look like normal business operations. In this session, we'... See more
Cloud attacks don't follow the playbook you're used to. Attackers compromise credentials, escalate privileges through legitimate tools, and move across your environment in ways that look like normal business operations. In this session, we'... See more
Cloud attacks don't follow the playbook you're used to. Attackers compromise credentials, escalate privileges through legitimate tools, and move across your environment in ways that look like normal business operations. In this session, we'... See more
You've seen how cloud attacks happen. Now let's talk about what actually works to stop them. In this session, we'll walk through a practical framework for protecting your cloud data against modern threats, from securing identities and closi... See more
You've seen how cloud attacks happen. Now let's talk about what actually works to stop them. In this session, we'll walk through a practical framework for protecting your cloud data against modern threats, from securing identities and closi... See more
You've seen how cloud attacks happen. Now let's talk about what actually works to stop them. In this session, we'll walk through a practical framework for protecting your cloud data against modern threats, from securing identities and closi... See more
Theory meets practice. In this session, hear directly from a customer about their journey to protect critical cloud data against modern cyber threats. They'll share the challenges they faced, the gaps they discovered in their existing appro... See more
Theory meets practice. In this session, hear directly from a customer about their journey to protect critical cloud data against modern cyber threats. They'll share the challenges they faced, the gaps they discovered in their existing appro... See more
Theory meets practice. In this session, hear directly from a customer about their journey to protect critical cloud data against modern cyber threats. They'll share the challenges they faced, the gaps they discovered in their existing appro... See more
For today's enterprises, DevOps platforms are the new center of gravity, housing not just source code, but the critical automation pipelines that power their cloud operations. The loss of this data can paralyze development and halt updates,... See more
For today's enterprises, DevOps platforms are the new center of gravity, housing not just source code, but the critical automation pipelines that power their cloud operations. The loss of this data can paralyze development and halt updates,... See more
For today's enterprises, DevOps platforms are the new center of gravity, housing not just source code, but the critical automation pipelines that power their cloud operations. The loss of this data can paralyze development and halt updates,... See more
Cloud attacks don't follow the playbook you're used to. Attackers compromise credentials, escalate privileges through legitimate tools, and move across your environment in ways that look like normal business operations. In this session, ... See more
You've seen how cloud attacks happen. Now let's talk about what actually works to stop them. In this session, we'll walk through a practical framework for protecting your cloud data against modern threats, from securing identities and cl... See more
For today's enterprises, DevOps platforms are the new center of gravity, housing not just source code, but the critical automation pipelines that power their cloud operations. The loss of this data can paralyze development and halt updates,... See more
Theory meets practice. In this session, hear directly from a customer about their journey to protect critical cloud data against modern cyber threats. They'll share the challenges they faced, the gaps they discovered in their existing ap... See more
Cloud attacks don't follow the playbook you're used to. Attackers compromise credentials, escalate privileges through legitimate tools, and move across your environment in ways that look like normal business operations. In this session, ... See more
You've seen how cloud attacks happen. Now let's talk about what actually works to stop them. In this session, we'll walk through a practical framework for protecting your cloud data against modern threats, from securing identities and cl... See more
Theory meets practice. In this session, hear directly from a customer about their journey to protect critical cloud data against modern cyber threats. They'll share the challenges they faced, the gaps they discovered in their existing ap... See more
For today's enterprises, DevOps platforms are the new center of gravity, housing not just source code, but the critical automation pipelines that power their cloud operations. The loss of this data can paralyze development and halt updates,... See more
Chris Voss is a former international FBI hostage negotiator and Wall Street Journal bestselling author of Never Split the Difference: Negotiating As If Your Life Depended On It. Drawing on more than two decades with the FBI—where he led negotiations in high-stakes kidnappings and crises around the world—Chris now teaches the proven strategies of tactical empathy and communication that drive better outcomes in business and life.
As the Founder & CEO of The Black Swan Group, Chris has trained executives, entrepreneurs, and leaders globally on the art of persuasion and negotiation. A recipient of the Attorney General’s Award for Excellence in Law Enforcement, he also teaches a popular MasterClass on negotiation and continues to inspire audiences with lessons from his extraordinary career in crisis leadership.
Regional virtual broadcasts will start at the following dates & times:
To attend, simply complete your registration and add the event to your calendar. All calendar holds will have a link to join the event embedded in them. You will also receive an email 24 hours and 30 minutes prior to the event with links to join.
There is no cost to attend Cloud Resilience Summit.
By joining this virtual event, you’ll also be eligible for 2 CPE credits (1 per hour watched) through (ISC)^2.
Following the event, you can submit your credits through the (ISC)^2 member dashboard, with the course name of Rubrik Cloud Resilience Summit. Your attendee email will qualify as proof of attendance.
Yes, all sessions from Cloud Resilience Summit will be available to registered attendees to view on demand after the regional broadcasts have ended.