On June 23, attendees tuned in Live Online for the SANS Ransomware Summit 2023!
We invited Ashton Rodenhiser of Mind's Eye Creative to create graphic recordings of our Summit presentations. If you missed a talk or are looking to view the Summit through a visual lens, take a look at the recordings below.
*If you registered for the Summit, video recordings are available on your Summit Access page in your SANS Portal.
Keynote | A Post-Apocalyptic Hellscape: What Ransomware Looks Like After RaaS
Allan Liska, CSIRT, Recorded Future
Analysis on legit tools abused in human operated ransomware
Toru Yamashige, Senior Incident Response Consultant, Trend Micro Inc.Keisuke Tanaka, Principal Incident Response Consultant, Trend Micro Inc.

Lessons from the frontlines: Ransomware attacks, new techniques and old tricks
Peter O, Cyber Threat Analyst, The DFIR ReportAlessandro Di Carlo, Forensics & Product Manager, Certego Srl
Jackpot! Three Years of ESXi Ransomware Incidents
Josef Williamson, Senior Threat Intelligence Analyst, Crowdstrike
A RaaS-ipe for disaster: The evolving Ransomware-as-a-Service (RaaS) space, as told through tools, techniques, and procedures (TTPs)
Jono Davis, Senior Analyst, PwC Global Threat Intelligence Team
Panel | Going Dark: DOS’ing Yourself for the Better
Ryan Chapman, Certified InstructorMichael Rogers, Sr. Director Technical Advisory Services, MOXFIVEChris Brewer, Director, Unit42Allan Liska, CSIRT, Recorded Future
You Got A TOAD: A Novel Technique For Dropping Ransomware
Arun Warikoo, Vice President, Cyber Threat Intelligence, BNP Paribas
Cracking Ransomware – Bypassing Anti-Analysis Techniques and Decrypting LockBit Black Ransomware
Noël Keijzer, Incident Responder / Reverse Engineer, Northwave
Beyond Encryption: Exploring the Tactics Ransomware Operators Use During Negotiation and their Impact
Bryce Webster-Jacobsen, Director of Intelligence Operations, GroupSenseSean Jones, Senior Intelligence Analyst, GroupSense
Data Science for Ransomware Defense and Negotiation
John Sturgis, Data Scientist, Cyentia Institute
If you'd like to check out our other upcoming Summits, you can view the latest listing here.