Lukasz Nowatkowski
Xopero Software S.A., cybersecurity advocate
Warsaw, Poland
Actions
Associated with the IT Security industry for over 20+ years. He managed and configured the first broadband Internet access networks.
He is the co-creator of the first antivirus remover against the Sasser worm, which spread on computer systems based on the Windows platform in 2004.
Has made many public appearances and comments on current events from the world of security (presentations / conferences / TV presentations / radio auditions)
nickname: r02Id (Romeo, Zero, Two, India, Delta)
os: Linux / MacOS
activity: kayaking / golf / lifehacking
Area of Expertise
Topics
Beyond Prevention: Building a Geopolitically Aware Cyber Resilience Program
Let's face it: the old "fortress" approach to cybersecurity is broken. We can't just build walls and hope for the best when nations use cyberattacks as a standard part of their political toolkit. For CISOs, this changes everything. The threat isn't just a technical problem anymore—it's a geopolitical one.
This session provides a new playbook for this reality. I'll show to all how to evolve from a prevention-only mindset to a truly resilient, geopolitically-aware security program. I'll examine why traditional security fails against modern threats and map out the new battlefields—from industrial systems (OT) and weaponized AI to the satellite infrastructure we all depend on.
All leave with a clear, actionable framework built on three pillars:
Intelligence That Predicts, Not Just Reacts: Learn to fuse cyber, geopolitical, and physical threat intelligence to anticipate an attacker's next move.
A Bulletproof Supply Chain: Your partners are your biggest risk. Cover game-changing strategies like radical transparency (SBOMs), Zero Trust, and active defense to turn your greatest liability into a strength.
Responding to Sabotage, Not Just Theft: Re-engineer your response plans for attackers who don't want your money—they want to cause chaos. Wants to prepare everyone for destructive, state-sponsored attacks.
I'll draw on lessons from major true events attack to help you translate these complex global threats into clear business risks your board can understand and act on.
The Ransomware Deadlock: Rules of Spherical Security
Shifting the Paradigm from Vulnerable Backups to Invincible Recovery
The traditional "defense-in-depth" model is failing. In 2026, ransomware strains are designed with one primary goal: to find, compromise, and wipe out the backup infrastructure before the first file is even encrypted. If your backup can be seen, it can be killed.
It’s time to change the game. This session introduces Spherical Security - a departure from linear, layered defenses toward a holistic, 360-degree protection model. We will explore how to create a "Ransomware Deadlock" where attackers, even with administrative privileges, find themselves unable to delete, modify, or encrypt the recovery core.
We will deconstruct the architecture of an invincible repository by implementing the 3-2-1-1-0 Rule:
* The Power of One (Immutability): Leveraging Single Write Repository logic and WORM (Write Once, Read Many) technology to ensure data stays unchangeable at the bit level.
* The Modern AirGap: Beyond the "offline" myth—how to achieve logical and physical isolation that meets 2026’s recovery speed requirements.
* The Zero-Point (Integrity): Why the "0" in 3-2-1-1-0 (zero errors through automated verification) is the most critical metric in a post-attack scenario.
Attendees will gain a new perspective on data storage trends and a technical blueprint for building a recovery environment that doesn't just survive ransomware but makes it irrelevant.
Key Learning Objectives (Key Takeaways):
* Defining Spherical Security: Why the transition from "layers" to "spheres" is necessary to protect against credential harvesting and internal threats.
* The Anatomy of a Single Write Repository: A deep dive into how WORM-based storage prevents "encryption-at-rest" attacks.
* Advanced 3-2-1-1-0 Implementation: Mastering the latest evolution of the golden backup rule for enterprise-grade resilience.
* AirGap 2.0: How to implement effective isolation without sacrificing the automation and speed of modern IT operations.
Ransomware Resilience & Recovery Summit | 2026 Sessionize Event Upcoming
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top