Downstairs RM3 – Session 1

Session 1

Fixing Human Error

The Weakest Link Is Still the Strongest Threat

Time: 12:15 -13:15

Now In Conjunction With:

Overview:

Human error remains one of the biggest causes of cyber breaches. If your staff aren’t following basic cybersecurity practices, your defences are already compromised. This session covers practical, effective ways to improve cyber hygiene across your organisation – without overwhelming your team with technical jargon.

Main Conference Room – Session 3

Facilitator

Paul Allen

Managing Director, Paull Allen & Associates PR

Paul Allen is Managing Director of the award-winning firm, Paul Allen and Associates, and has over 30 years of experience in all aspects of public relations and marketing communications. Paul is a graduate of DIT and a former RTE newsroom journalist.

Paul is former chairman of the Public Relations Consultants Association and is a regular contributor to media columns and television and radio programmes. Paul has extensive broadcasting experience having begun as a student broadcaster with pirate radio in Dublin. Paul also worked in the RTE newsroom. His career in RTE lasted 15 years.

Panelists

Lorna Burman

Distribution & Partnership Manager APAC & EMEA – usecure

Lorna is an experienced IT Manager of a global business, with 20+ years of navigating the channel. She was a former business owner in the tech space. Through strategic partnerships and innovative solutions, I’m committed to helping MSPs navigate the complex landscape of human-centric cybersecurity threats, creating human firewalls globally. 

Despite rapid advancements in cybersecurity technology, human error remains the number one cause of cyber breaches, responsible for 95% of cybersecurity incidents. Firewalls, endpoint protection, and AI-driven threat detection can only go so far – if your employees aren’t trained to recognise threats, your business remains vulnerable. 

So, how can businesses turn their people from the weakest link into the strongest defence? 

Join usecure to discover how a strong cybersecurity culture can transform human error into human resilience. 

Presentation on:

Strengthening Cybersecurity Culture –

Fixing the Human Error Problem 

Strengthening Cybersecurity Culture – Fixing the Human Error Problem

Despite rapid advancements in cybersecurity technology, human error remains the number one cause of cyber breaches, responsible for 95% of cybersecurity incidents. Firewalls, endpoint protection, and AI-driven threat detection can only go so far - if your employees aren’t trained to recognise threats, your business remains vulnerable. 

So, how can businesses turn their people from the weakest link into the strongest defence? 

Join usecure to discover how a strong cybersecurity culture can transform human error into human resilience.

Jeff Jones

Territory Directory Emea, Asia and Far East at Admin By Request

Jeff Jones is a seasoned professional with extensive experience in technology and management, currently serving as the Territory Director for EMEA and Asia at Admin By Request and FastTrack Software. With a career spanning from 1995, Jones has held significant roles including Director at ACC Yotta, where the focus was on research-driven IT solutions, and Owner of YottaServe, a specialized application hosting center. Previously, as Technical Director at Emojo Ltd., Jones contributed to the company’s growth and stability while managing key accounts, including the Royal Opera House. Early experience as R&D Labs Manager at Carrera Technology Ltd. involved overseeing product development and achieving notable industry recognition. Jones’s educational background includes studies at Bearwood College and Eagle House.

An IDC survey of 300 CISOs showed that 67% of cloud network security issues also stemmed from user errors and misconfigurations. Admin By Requests Jeff R Jones discusses the ‘Threat Of Misconfiguration’ and offers five useful tips on how smoke the complexity out of your systems in order to minimise costly misconfiguration mistakes. 

Presenting on: 

Complexity Is A VULERABILITY! 

Complexity Is A VULERABILITY! 

An IDC survey of 300 CISOs showed that 67% of cloud network security issues also stemmed from user errors and misconfigurations. Admin By Requests Jeff R Jones discusses the 'Threat Of Misconfiguration' and offers five useful tips on how smoke the complexity out of your systems in order to minimise costly misconfiguration mistakes. 

Picture18

Ed Rowley

Channel Sales Engineering Director, Proofpoint

Ed Rowley has worked in Cybersecurity since 1999, working for several Security vendors in a variety of roles including positions in Marketing, Technical Support, Product Management and Sales Engineering. Ed joined Proofpoint in 2014 where he started as a Sales Engineer. After 2 years in the role, he was promoted to EMEA Commercial SE Manager and now holds the role of Director, Channel Sales Engineering for EMEA & APJ. 

Join Proofpoint as we go back in time to find out why people and their emotions remain one of the biggest causes of cyber breaches. If your staff aren’t following basic cybersecurity practices, your defences are already compromised. This session covers practical, effective ways to improve cyber hygiene across your organisation and understand the impact of the Human element on Security.

Presenting on: 

The Human Factor: Why Cybersecurity Still Starts with People

The Human Factor: Why Cybersecurity Still Starts with People

Join Proofpoint as we go back in time to find out why people and their emotions remain one of the biggest causes of cyber breaches. If your staff aren’t following basic cybersecurity practices, your defences are already compromised. This session covers practical, effective ways to improve cyber hygiene across your organisation and understand the impact of the Human element on Security.

Cyber Conference Agenda

KeyNote:

The Cyber Arms Race: Winning in a World of AI-Powered Threats

AI is transforming the cybersecurity landscape at an unprecedented rate, creating new opportunities for both attackers and defenders. If your organisation isn’t adapting, it risks falling behind. This keynote will unpack how AI is shaping the future of cyber threats—and what you must do now to stay one step ahead.

10:00am- 10:30am

Paul C Dwyer, CEO, Cyber Risk International

AI in Cybersecurity: Friend, Foe, or Both?

AI is a game-changer in cybersecurity, but it’s also a double-edged sword. If attackers are using AI to breach defences, how can defenders stay ahead? This session covers real-world examples of AI in cyberattacks and how organisations can leverage AI responsibly to strengthen their security posture.

10:40am- 11:55am

Stream Lead: Markus Melin, Founder, NROC

The Evolution and Future of MSSPs

Cybersecurity has shifted from a product to a service. This session explores how Managed Security Service Providers (MSSPs) have transformed traditional cybersecurity approaches into scalable, service-driven models. Learn how organisations can take advantage of these services to mitigate risk and manage threats in real-time.

10:45am- 11:45am

Stream Lead: David McCullough- Chief Commercial Officer, Xsell

Ransomware Reloaded: Navigating the Evolution of Cyber Extortion

Ransomware attacks have evolved far beyond simple encryption. Today’s attackers use tactics like double extortion, where they both encrypt data and threaten to leak it. If your organisation doesn’t have a solid ransomware response plan, you’re a target. This session covers how ransomware is changing and how to stay one step ahead.

10:45am- 11:45am

Stream Lead: To Be Announced

Fixing Human Error: The Weakest Link Is Still the Strongest Threat

Human error remains one of the biggest causes of cyber breaches. If your staff aren’t following basic cybersecurity practices, your defences are already compromised. This session covers practical, effective ways to improve cyber hygiene across your organisation - without overwhelming your team with technical jargon.

12:15pm -13:15pm

Stream Lead: To Be Announced

Supply Chain Security: Your Weakest Link is Their Way In

A practical guide to identifying and fixing vulnerabilities across your supply chain before attackers exploit them. If your vendors aren’t secure, you aren’t either. This session covers real-world tactics to shore up your supply chain defences.

12:00pm -13:00pm

Stream Lead: To Be Announced

Building Cyber Resilience: Empowering People and Technology

Cyber resilience isn’t just about having the right tools - it’s about embedding security into the very fabric of your organisation. Attackers exploit both human error and technical weaknesses, so how do you build defences that cover both? This session goes beyond firewalls and frameworks, focusing on how to develop a culture of security strategy where people and technology work together to withstand, adapt to, and recover from cyber threats. We’ll explore how to upskill teams, foster security-first mindsets, and implement adaptive technologies that keep you ahead of evolving risks. Expect practical insights and actionable steps to make resilience a core part of your organisation’s DNA.

12:00pm -13:00pm​

Stream Lead: Paul Hearns, Business Owner at PJH Consulting

The Compliance Trap: Why Being ‘Secure Enough’ Won’t Cut It in the Era of DORA and NIS2

Many organisations think meeting regulatory compliance standards is enough to keep them secure. It isn’t. If your focus stops at compliance, you’re leaving gaps attackers can exploit. This session explores how to go beyond regulatory requirements and build a security strategy that protects your organisation from real-world threats.

14:00pm  - 15:10pm

Stream Lead:Paul C Dwyer, CEO, Cyber Risk International

The Future of AV Integration in Ireland

The future of AV integration in Ireland is rapidly evolving, driven by advancements in technology and the increasing demand for seamless, intelligent systems. From smart meeting rooms and immersive education environments to cutting-edge entertainment systems, the potential for AV technologies to transform how we communicate and collaborate is immense. This session will explore the exciting opportunities and challenges in integrating AV solutions with modern IT infrastructures.

14:00pm  - 15:00pm

Stream Lead: To Be Announced

The Next Phase of Cloud Security: Embedding Zero Trust from Edge to Identity

Cloud environments demand more than patchwork defence - they require security by design. As organisations move into the next phase of cloud adoption, Zero Trust must be embedded throughout the architecture, from the network edge to user identity. This session explores how to implement practical, scalable Zero Trust strategies that secure access, protect data, and align with the way modern infrastructure actually works.

2:00pm -3:00pm​

Stream Lead: Paul Edmonson, Commercial Director, InspiritVision and Director and EMEA-Hub

Closing Panel:

Threat Horizon 2030: Preparing for the Next Wave of Cyber Risks

Cybersecurity threats are evolving at a faster pace than ever before. If you’re only planning for today’s risks, you’re already behind. This panel discussion will feature industry leaders sharing their predictions for the next decade and offering practical advice on how organisations can build resilience for what’s coming next.

15.30pm - 16:30pm

Charlie Taylor- Technology and Innovation Editor at Business Post

Join Our Cyber Ecosystem

Become a part of our growing Cyber Security Ecosystem. We’re Bringing everyone together!

Vendors
+
VARs & MSPs
+
Cyber Experts
+
Attendees Registered Annually
+