With various EU directives coming online over the next 12 months, what will this mean for CISO, Organisations and IT professionals? Our panel will discuss how organisations need to be compliant and how to reduce the risk of fines or warnings for the changing regulations.
Extraordinary innovation happens when we include and learn from diverse people and perspectives. Advance your talent in Cybersecurity programs and careers as we walk through fire together
Do you think we as a nation are ready to defend ourselves against a large-scale cyber-attack from an external entity?
On this panel we will discuss what is currently being done to protect Irish infrastructure and businesses against the ever-increasing threat of international hackers. Is this enough and what should we be doing to strengthen our protection. The panel will also discuss Ireland’s National Cyber Security Strategy and the potential impact that not taking these treats seriously could have on foreign direct investment.
Asserting the imperative of strategic leadership, Dwyer presents a clear, actionable blueprint for navigating the complex terrain of cyber risk management. Underlining the recent European Union legislation, the Digital Operational Resilience Act (DORA) illuminates the integral role of management boards in spearheading ICT security strategies. DORA cements the fact that business leaders aren’t just spectators but are now fully responsible and accountable for mitigating cyber risks within their organisations.
Do you think we as a nation are ready to defend ourselves against a large-scale cyber-attack from an external entity?
On this panel we will discuss what is currently being done to protect Irish infrastructure and businesses against the ever-increasing threat of international hackers. Is this enough and what should we be doing to strengthen our protection. The panel will also discuss Ireland’s National Cyber Security Strategy and the potential impact that not taking these treats seriously could have on foreign direct investment.
Explore how aligning Identity Governance and Administration (IGA) with the Cyber Assessment Framework (CAF) principles strengthens security, ensures compliance, and enhances organizational resilience by implementing robust identity management strategies that meet regulatory and operational standards.
The National Cyber Security Centre is leading on addressing the cyber skills gap through facilitating increased access to courses, increasing awareness of careers in cybersecurity and in undertaking market analysis to better understand supply and demand. The Centre is also leading on the development of a national strategy to foster state of the art research, innovation and industrial development with cybersecurity. Within this context, this keynote address will also cover the new National Cybersecurity Coordination and Development Centre project, encompassing a €2 million programme of supports for industry and societal stakeholders to strengthen resilience and facilitate innovation.
Digital Operational Resilience Act (DORA) is the first piece of legislation at the European level addressing the topic of digital operational resilience for financial services. It is hailed as a “game changer” that will push Financial Services firms to fully understand how their ICT, operational resilience, cyber and TPRM practices affect the resilience of their most critical functions as well as develop entirely new operational resilience capabilities.
What does DORA mean for firms and how should financial forms engage with the Act?
Prioritising cyber resilience has never been more essential! Following the introduction of the European Union’s NIS2 directive, we will discuss the challenges and risks organisations will face and when implementing upcoming EU Regulations including: NIS2, DORA and the EU AI Directive. Our panel will cover what this means for you and your organisation.
Despite advancements in technology, human error remained a weak link that attackers could exploit. This session emphasised the crucial role individuals played in safeguarding digital systems against the evolving threat landscape. Our speakers explored the different human behaviours that contributed to security breaches and discussed practical strategies that organisations could take to minimise security breaches.
The world of IT and cyber security is constantly evolving, and staying ahead of the curve is essential for protecting your networks and sensitive information, and preventing cyberattacks. With new technologies emerging all the time, it can be challenging to keep up with the latest trends and developments. From Artificial Intelligence (AI) and Machine Learning (ML), Behavioural Biometrics, Zero Trust Architecture, Blockchain, Quantum Computing, Cloud Security and IoT Security,this panel will discuss some of the newest security technologies and how they can help strengthen your IT systems to keep your data safe.
The Network and Information Security Directive Revision 2 brings into scope more sectors and focuses on providing guidelines to ensure uniform transposition across EU member states.
Ways in which your Cyber Security can be compromised, in addition to attacks from bad actors can also include inadvertent mixing of data and workflows across corporate and personal IT
Examples of how the increasing complexity and blurred boundaries between work and home can lead to inadvertent data leakage and increased cyber risk
Drafting and presenting policies and controls in a way that brings your people – your last line of defence – with you, even if they are non technical.
The proliferation of supply chain attacks has led to greater levels of organisational disruption and personal compromise as criminals continue to exploit vulnerabilities in supply chain services. This session will shine a light on:
Internet-of-Things (IoT) devices have increasingly been the target of malicious attacks. Even after numerous reported incidents the use of IoT devices in organisations has not slowed down. Being relatively cheap, small, and easy to deploy, IoT devices provide many useful capabilities including environment monitoring, surveillance, data streaming, and acting as direct communication between parties. So how do organisations protect themselves from being a target?
Can academia and cyber experts work together to provide a continuous supply of qualified cybersecurity professionals? Do Irish organisations face a skills gap or a retention issue? How organisations can encourage diversity and inclusion in their workforce?
CIOs can take the CrowdStrike outage as an opportunity to reassess their company’s preparedness against major outages. Testing out crisis scenarios and developing business continuity plans are some of the tools available to tech chiefs before the next major IT outage strikes.
In this talk, Blessing Usoro explores the cybersecurity risks that organisations, businesses, and the public face as AI technology advances. She will highlight real threats such as deepfake attacks, AI-powered phishing, and automated hacking tools. Blessing will discuss data privacy concerns, vulnerabilities in critical infrastructure, and the ethical issues of using AI in cybersecurity. Attendees will learn practical tips and best practices to protect their digital infrastructure and personal data, gaining a clear understanding of how to navigate the complex world of cybersecurity in the AI era.
Panel to discuss exploring new cybersecurity threats in 2025 this panel should cover areas such as AI-powered attacks, quantum computing vulnerabilities, supply chain risks.