Main Conference Room- Session 2

Session 2

AI in Cybersecurity

Friend, Foe, or Both?

Time: 10:40 – 11:55

Now In Conjunction With:

Overview:

AI is a game-changer in cybersecurity, but it’s also a double-edged sword. If attackers are using AI to breach defences, how can defenders stay ahead? This session covers real-world examples of AI in cyberattacks and how organisations can leverage AI responsibly to strengthen their security posture.

Main Conference Room – Session 2

Facilitator

Picture4

Markus Melin

Co-Founder, NROC Security

Markus Melin, Product and digital transformation business leader working with global / international business. Modern and inspiring people leader with ability to grow people. Proven track record on turning around businesses to new strategic direction with start-up attitude. Markus Melin has 20+ years experience in software business with different industries. Excellent knowledge on multiple industries, such as Automotive, Finance, Insurance, Retail just to mention a few. Working with complex multi-cloud (both private and public) environments including sensor systems, driving purpose-built sales, marketing and go-to-market to a successful growth, also with M&A. Industry thought leader. In the past, running R&D and development units, working with business applications and digitalisation of enterprises – Cyber Security product development and development of Cyber Security as a Service / MSSP services. He is the Co-founder and COO in Gen AI cybersecurity.

AI in Cybersecurity: Friend, Foe, or Both?

AI is a game-changer in cybersecurity, but it’s also a double-edged sword. If attackers are using AI to breach defences, how can defenders stay ahead? This session covers real-world examples of AI in cyberattacks and how organisations can leverage AI responsibly to strengthen their security posture.

Panelists

Picture5

Michael Simpson

Senior Sales Engineer, Lookout

With a ten-year military background in highly sensitive IT infrastructure, Michael brings a rare and potent perspective to cybersecurity. His subsequent five years as a covert surveillance technician for a Commercial Spyware Vendor provided him with an insider’s view into the methodologies of sophisticated threat actors. This experience uniquely positions him to demonstrate the absolute necessity of comprehensive security measures against all tiers of adversaries. 

The escalating sophistication of mobile threats and social engineering demands intelligent and data-driven security solutions. In this session, we will focus on how Lookout established the world’s largest mobile threat intelligence corpus and how only a variety of AI technologies turn the data into actionable defence.  

Presentation on:

From Data to Defence: How AI Transforms Mobile Security Through Massive Threat Intelligence 

From Data to Defence: How AI Transforms Mobile Security Through Massive Threat Intelligence

The escalating sophistication of mobile threats and social engineering demands intelligent and data-driven security solutions. In this session, we will focus on how Lookout established the world's largest mobile threat intelligence corpus and how only a variety of AI technologies turn the data into actionable defence.  

Thomas Bell

Presales Consultant, Hornetsecurity

Thomas Bell (Tom) is one of the dedicated Presales Consultants in the Hornetsecurity support team, where he plays a vital role in guiding partners and customers through every step of their cyber onboarding and growth journey. With a strong technical background and hands-on experience working within a Managed Service Provider himself, Tom understands the real-world challenges of implementing and managing cybersecurity solutions and imparts his knowledge in manageable chunks to help businesses of all sizes bolster their defences.  

Thomas Bell, Pre-Sales Consultant at Hornetsecurity, shares three critical actions you must take now to harness AI securely ensuring it works for you, not against you. He exposes key risk areas, from misconfigured permissions, to insider threats, and external attackers exploiting AI-enabled accounts. 

Presenting on: 

AI in the Wrong Hands: The Dark Side of ChatGPT and Generative AI 

AI in the Wrong Hands: The Dark Side of ChatGPT and Generative AI

Thomas Bell, Pre-Sales Consultant at Hornetsecurity, shares three critical actions you must take now to harness AI securely ensuring it works for you, not against you. He exposes key risk areas, from misconfigured permissions, to insider threats, and external attackers exploiting AI-enabled accounts. 

Picture18

Ed Rowley

Channel Sales Engineering Director, Proofpoint

Ed Rowley has worked in Cybersecurity since 1999, working for several Security vendors in a variety of roles including positions in Marketing, Technical Support, Product Management and Sales Engineering. Ed joined Proofpoint in 2014 where he started as a Sales Engineer. After 2 years in the role, he was promoted to EMEA Commercial SE Manager and now holds the role of Director, Channel Sales Engineering for EMEA & APJ. 

In this session, we will look at how Criminal gangs have embraced AI to launch attacks ranging from simple Phishing messages to sophisticated ‘Deep Fakes’. We will look at some of the strengths and weaknesses associated with AI and review what steps the Cybersecurity Industry and Security Practitioners are taking to combat these advanced threats and also look to the future as we consider what might happen next in this rapidly moving AI arms race. 

Presenting on: 

AI Track: Deep Fakes & Deeper Threats: How Criminals Are Weaponising AI

In this session, we will look at how Criminal gangs have embraced AI to launch attacks ranging from simple Phishing messages to sophisticated ‘Deep Fakes’. We will look at some of the strengths and weaknesses associated with AI and review what steps the Cybersecurity Industry and Security Practitioners are taking to combat these advanced threats and also look to the future as we consider what might happen next in this rapidly moving AI arms race. 

Josip Dell'Olio

Director of Support, LevelBlue

Josip Dell’Olio is a leader at LevelBlue, operating at the intersection of artificial intelligence, cybersecurity, and customer success. As the elected Shaman of Section 31, LevelBlue’s AI think tank, he drives innovation and thought leadership in applied AI for cybersecurity. Known as the “Problemologist,” Josip is recognized for solving interdisciplinary challenges with actionable solutions. His expertise spans AI, security, and customer success, empowering organizations to unlock the value of emerging technologies. Josip blends technical depth with business, enabling measurable impact. He is a sought after advisor and tactical operator, bringing vision and technical rigor to engagement.

Presenting on: 

How Design Thinking and AI Unlock Business Growth

How Design Thinking and AI Unlock Business Growth

Josip Dell’Olio will show you how to innovate and stand out in a hyper productive world.

Instead of long term committing to the same AI features, you’ll learn how to rapidly ship

  • How Design Thinking combined with AI can help you create original solutions
  • How to outpace your competition: Incubate and deliver faster and smarter

Key Takeaways:

  • A practical approach to innovate authentically
  • Real world examples and actionable strategies for accelerating and outpacing

Lee Omandap

Sr. Sales Engineer

I have been at Bitdefender for over a year and previously for different AI cybersecurity vendor as a Senior Sales Engineer for four years. Which is where I discovered my interest in Artificial Intelligence, and cybersecurity. In my free time, enjoy spending time with my 3 year old daughter and wife – taking them on weekly adventures and have an interest in all things gadgets.

From Risk to Resilience: The Strategic Role of AI in Cyber Defence

In this session I will be describing how AI is useful to people and how AI can be used by malicious actors and defensively by organizations in the cybersecurity world. We will focus on how Bitdefender provides AI security solutions purpose built for protecting organizations large and small.

Cyber Conference Agenda

KeyNote:

The Cyber Arms Race: Winning in a World of AI-Powered Threats

AI is transforming the cybersecurity landscape at an unprecedented rate, creating new opportunities for both attackers and defenders. If your organisation isn’t adapting, it risks falling behind. This keynote will unpack how AI is shaping the future of cyber threats—and what you must do now to stay one step ahead.

10:00am- 10:30am

Paul C Dwyer, CEO, Cyber Risk International

AI in Cybersecurity: Friend, Foe, or Both?

AI is a game-changer in cybersecurity, but it’s also a double-edged sword. If attackers are using AI to breach defences, how can defenders stay ahead? This session covers real-world examples of AI in cyberattacks and how organisations can leverage AI responsibly to strengthen their security posture.

10:40am- 11:55am

Stream Lead: Markus Melin, Founder, NROC

The Evolution and Future of MSSPs

Cybersecurity has shifted from a product to a service. This session explores how Managed Security Service Providers (MSSPs) have transformed traditional cybersecurity approaches into scalable, service-driven models. Learn how organisations can take advantage of these services to mitigate risk and manage threats in real-time.

10:45am- 11:45am

Stream Lead: David McCullough- Chief Commercial Officer, Xsell

Ransomware Reloaded: Navigating the Evolution of Cyber Extortion

Ransomware attacks have evolved far beyond simple encryption. Today’s attackers use tactics like double extortion, where they both encrypt data and threaten to leak it. If your organisation doesn’t have a solid ransomware response plan, you’re a target. This session covers how ransomware is changing and how to stay one step ahead.

10:45am- 11:45am

Stream Lead: To Be Announced

Fixing Human Error: The Weakest Link Is Still the Strongest Threat

Human error remains one of the biggest causes of cyber breaches. If your staff aren’t following basic cybersecurity practices, your defences are already compromised. This session covers practical, effective ways to improve cyber hygiene across your organisation - without overwhelming your team with technical jargon.

12:15pm -13:15pm

Stream Lead: To Be Announced

Supply Chain Security: Your Weakest Link is Their Way In

A practical guide to identifying and fixing vulnerabilities across your supply chain before attackers exploit them. If your vendors aren’t secure, you aren’t either. This session covers real-world tactics to shore up your supply chain defences.

12:00pm -13:00pm

Stream Lead: To Be Announced

Building Cyber Resilience: Empowering People and Technology

Cyber resilience isn’t just about having the right tools - it’s about embedding security into the very fabric of your organisation. Attackers exploit both human error and technical weaknesses, so how do you build defences that cover both? This session goes beyond firewalls and frameworks, focusing on how to develop a culture of security strategy where people and technology work together to withstand, adapt to, and recover from cyber threats. We’ll explore how to upskill teams, foster security-first mindsets, and implement adaptive technologies that keep you ahead of evolving risks. Expect practical insights and actionable steps to make resilience a core part of your organisation’s DNA.

12:00pm -13:00pm​

Stream Lead: Paul Hearns, Business Owner at PJH Consulting

The Compliance Trap: Why Being ‘Secure Enough’ Won’t Cut It in the Era of DORA and NIS2

Many organisations think meeting regulatory compliance standards is enough to keep them secure. It isn’t. If your focus stops at compliance, you’re leaving gaps attackers can exploit. This session explores how to go beyond regulatory requirements and build a security strategy that protects your organisation from real-world threats.

14:00pm  - 15:10pm

Stream Lead:Paul C Dwyer, CEO, Cyber Risk International

The Future of AV Integration in Ireland

The future of AV integration in Ireland is rapidly evolving, driven by advancements in technology and the increasing demand for seamless, intelligent systems. From smart meeting rooms and immersive education environments to cutting-edge entertainment systems, the potential for AV technologies to transform how we communicate and collaborate is immense. This session will explore the exciting opportunities and challenges in integrating AV solutions with modern IT infrastructures.

14:00pm  - 15:00pm

Stream Lead: To Be Announced

The Next Phase of Cloud Security: Embedding Zero Trust from Edge to Identity

Cloud environments demand more than patchwork defence - they require security by design. As organisations move into the next phase of cloud adoption, Zero Trust must be embedded throughout the architecture, from the network edge to user identity. This session explores how to implement practical, scalable Zero Trust strategies that secure access, protect data, and align with the way modern infrastructure actually works.

2:00pm -3:00pm​

Stream Lead: Paul Edmonson, Commercial Director, InspiritVision and Director and EMEA-Hub

Closing Panel:

Threat Horizon 2030: Preparing for the Next Wave of Cyber Risks

Cybersecurity threats are evolving at a faster pace than ever before. If you’re only planning for today’s risks, you’re already behind. This panel discussion will feature industry leaders sharing their predictions for the next decade and offering practical advice on how organisations can build resilience for what’s coming next.

15.30pm - 16:30pm

Charlie Taylor- Technology and Innovation Editor at Business Post

Join Our Cyber Ecosystem

Become a part of our growing Cyber Security Ecosystem. We’re Bringing everyone together!

Vendors
+
VARs & MSPs
+
Cyber Experts
+
Attendees Registered Annually
+