With various EU directives coming online over the next 12 months, what will this mean for CISO, Organisations and IT professionals? Our panel will discuss how organisations need to be compliant and how to reduce the risk of fines or warnings for the changing regulations.
Do you think we as a nation are ready to defend ourselves against a large-scale cyber-attack from an external entity?
On this panel we will discuss what is currently being done to protect Irish infrastructure and businesses against the ever-increasing threat of international hackers. Is this enough and what should we be doing to strengthen our protection. The panel will also discuss Ireland’s National Cyber Security Strategy and the potential impact that not taking these treats seriously could have on foreign direct investment.
Explore how aligning Identity Governance and Administration (IGA) with the Cyber Assessment Framework (CAF) principles strengthens security, ensures compliance, and enhances organizational resilience by implementing robust identity management strategies that meet regulatory and operational standards.
Prioritising cyber resilience has never been more essential! Following the introduction of the European Union’s NIS2 directive, we will discuss the challenges and risks organisations will face and when implementing upcoming EU Regulations including: NIS2, DORA and the EU AI Directive. Our panel will cover what this means for you and your organisation.
Internet-of-Things (IoT) devices have increasingly been the target of malicious attacks. Even after numerous reported incidents the use of IoT devices in organisations has not slowed down. Being relatively cheap, small, and easy to deploy, IoT devices provide many useful capabilities including environment monitoring, surveillance, data streaming, and acting as direct communication between parties. So how do organisations protect themselves from being a target?
Despite advancements in technology, human error remained a weak link that attackers could exploit. This session emphasised the crucial role individuals played in safeguarding digital systems against the evolving threat landscape. Our speakers explored the different human behaviours that contributed to security breaches and discussed practical strategies that organisations could take to minimise security breaches.
Ways in which your Cyber Security can be compromised, in addition to attacks from bad actors can also include inadvertent mixing of data and workflows across corporate and personal IT
Examples of how the increasing complexity and blurred boundaries between work and home can lead to inadvertent data leakage and increased cyber risk
Drafting and presenting policies and controls in a way that brings your people – your last line of defence – with you, even if they are non technical.
Can academia and cyber experts work together to provide a continuous supply of qualified cybersecurity professionals? Do Irish organisations face a skills gap or a retention issue? How organisations can encourage diversity and inclusion in their workforce?
CIOs can take the CrowdStrike outage as an opportunity to reassess their company’s preparedness against major outages. Testing out crisis scenarios and developing business continuity plans are some of the tools available to tech chiefs before the next major IT outage strikes.
In this talk, Blessing Usoro explores the cybersecurity risks that organisations, businesses, and the public face as AI technology advances. She will highlight real threats such as deepfake attacks, AI-powered phishing, and automated hacking tools. Blessing will discuss data privacy concerns, vulnerabilities in critical infrastructure, and the ethical issues of using AI in cybersecurity. Attendees will learn practical tips and best practices to protect their digital infrastructure and personal data, gaining a clear understanding of how to navigate the complex world of cybersecurity in the AI era.
Panel to discuss exploring new cybersecurity threats in 2025 this panel should cover areas such as AI-powered attacks, quantum computing vulnerabilities, supply chain risks.