Main Conference Room – Session 3

Session 3

Ransomware Reloaded

Navigating the Evolution of Cyber Extortion

Time:10:45 – 11:45

Now In Conjunction With:

Overview:

Ransomware attacks have evolved far beyond simple encryption. Today’s attackers use tactics like double extortion, where they both encrypt data and threaten to leak it. If your organisation doesn’t have a solid ransomware response plan, you’re a target. This session covers how ransomware is changing and how to stay one step ahead.

Downstairs RM3 – Session 1

Facilitator

Dr. Vivienne Mee

Founder VM Group

Vivienne has worked on large electronic discovery cases both in Ireland and across Europe with various forensic teams. As part of her PhD studies, Vivienne was a member of the Information Security Research Group at the University of Glamorgan. Here she spent a number of years working at their Forensic Laboratory, investigating cybercrimes and latest trends which fed into extensive research with the Serious Organised Crime Agency (SOCA), Ministry of Defence, Defence Science & Technology Labs and UK Security Service (MI5).

Panelists

Patrick Brennan

Partner Sales EMEA, CybelAngel

Patrick serves as the Global Partner Sales Director at CybelAngel, where he is responsible for growing and scaling MSSP and resale partnerships. With a broad background in the IT industry, Patrick has worked with leading multinational companies like Cisco and Apple, as well as dynamic start-ups. Over the past six years, his focus has been on developing and nurturing cybersecurity partner ecosystems, helping businesses leverage strategic alliances to drive growth and innovation in the cybersecurity space. 

Presentation on:

Ransomware Threat Intelligence: Uncovering Insights and Defending Against the Evolving Risk

Ransomware Threat Intelligence: Uncovering Insights and Defending Against the Evolving Risk

Ransomware attacks are more sophisticated than ever, with Irish organisations becoming increasingly targeted. Pat Brennan, Global Partner Sales Director at CybelAngel, will reveal the latest strategies used by ransomware gangs, including hidden entry points they exploit beyond stolen credentials.

Morten Gammelgard

Co-Founder & Global CRO

Morten lives in London and has 25 years of experience in the cybersecurity industry. Morten is Executive Vice President of BullWall and leads the company’s commercial department, focusing on building an effective distribution network and enhancing customer satisfaction. He is an accomplished security leader, experienced in leading teams that have supported the world’s largest companies dramatically improve their security posture. Morten has held leadership positions in a number of technology companies, such as Sophos, VMware and Ivanti.

Presenting on: 

Breaking the Chain: Ransomware Defense That Meets ALL Compliance Standards

Breaking the Chain: Ransomware Defense That Meets ALL Compliance Standards

As cyber threats grow more sophisticated, organisations must strengthen their resilience to safeguard critical operations from ransomware and other attacks. This session, led by BullWall, will provide essential strategies for maintaining business continuity and ensuring rapid recovery from cyber incidents.

Join Morten Gammelgard as he explores:

  • How ransomware and other cyber threats really bypass preventative security solutions
  • The role of BullWall’s containment solution in maintaining operational continuity during an attack
  • Proven strategies to prevent phishing, impersonation threats, and automated exploits
  • Best practices for enhancing incident response and minimizing downtime

Ensure your organization remains resilient in the face of evolving cyber threats—don’t wait until it’s too late.

Cyber Conference Agenda

KeyNote:

The Cyber Arms Race: Winning in a World of AI-Powered Threats

AI is transforming the cybersecurity landscape at an unprecedented rate, creating new opportunities for both attackers and defenders. If your organisation isn’t adapting, it risks falling behind. This keynote will unpack how AI is shaping the future of cyber threats—and what you must do now to stay one step ahead.

10:00am- 10:30am

Paul C Dwyer, CEO, Cyber Risk International

AI in Cybersecurity: Friend, Foe, or Both?

AI is a game-changer in cybersecurity, but it’s also a double-edged sword. If attackers are using AI to breach defences, how can defenders stay ahead? This session covers real-world examples of AI in cyberattacks and how organisations can leverage AI responsibly to strengthen their security posture.

10:40am- 11:55am

Stream Lead: Markus Melin, Founder, NROC

The Evolution and Future of MSSPs

Cybersecurity has shifted from a product to a service. This session explores how Managed Security Service Providers (MSSPs) have transformed traditional cybersecurity approaches into scalable, service-driven models. Learn how organisations can take advantage of these services to mitigate risk and manage threats in real-time.

10:45am- 11:45am

Stream Lead: David McCullough- Chief Commercial Officer, Xsell

Ransomware Reloaded: Navigating the Evolution of Cyber Extortion

Ransomware attacks have evolved far beyond simple encryption. Today’s attackers use tactics like double extortion, where they both encrypt data and threaten to leak it. If your organisation doesn’t have a solid ransomware response plan, you’re a target. This session covers how ransomware is changing and how to stay one step ahead.

10:45am- 11:45am

Stream Lead: To Be Announced

Fixing Human Error: The Weakest Link Is Still the Strongest Threat

Human error remains one of the biggest causes of cyber breaches. If your staff aren’t following basic cybersecurity practices, your defences are already compromised. This session covers practical, effective ways to improve cyber hygiene across your organisation - without overwhelming your team with technical jargon.

12:15pm -13:15pm

Stream Lead: To Be Announced

Supply Chain Security: Your Weakest Link is Their Way In

A practical guide to identifying and fixing vulnerabilities across your supply chain before attackers exploit them. If your vendors aren’t secure, you aren’t either. This session covers real-world tactics to shore up your supply chain defences.

12:00pm -13:00pm

Stream Lead: To Be Announced

Building Cyber Resilience: Empowering People and Technology

Cyber resilience isn’t just about having the right tools - it’s about embedding security into the very fabric of your organisation. Attackers exploit both human error and technical weaknesses, so how do you build defences that cover both? This session goes beyond firewalls and frameworks, focusing on how to develop a culture of security strategy where people and technology work together to withstand, adapt to, and recover from cyber threats. We’ll explore how to upskill teams, foster security-first mindsets, and implement adaptive technologies that keep you ahead of evolving risks. Expect practical insights and actionable steps to make resilience a core part of your organisation’s DNA.

12:00pm -13:00pm​

Stream Lead: Paul Hearns, Business Owner at PJH Consulting

The Compliance Trap: Why Being ‘Secure Enough’ Won’t Cut It in the Era of DORA and NIS2

Many organisations think meeting regulatory compliance standards is enough to keep them secure. It isn’t. If your focus stops at compliance, you’re leaving gaps attackers can exploit. This session explores how to go beyond regulatory requirements and build a security strategy that protects your organisation from real-world threats.

14:00pm  - 15:10pm

Stream Lead:Paul C Dwyer, CEO, Cyber Risk International

The Future of AV Integration in Ireland

The future of AV integration in Ireland is rapidly evolving, driven by advancements in technology and the increasing demand for seamless, intelligent systems. From smart meeting rooms and immersive education environments to cutting-edge entertainment systems, the potential for AV technologies to transform how we communicate and collaborate is immense. This session will explore the exciting opportunities and challenges in integrating AV solutions with modern IT infrastructures.

14:00pm  - 15:00pm

Stream Lead: To Be Announced

The Next Phase of Cloud Security: Embedding Zero Trust from Edge to Identity

Cloud environments demand more than patchwork defence - they require security by design. As organisations move into the next phase of cloud adoption, Zero Trust must be embedded throughout the architecture, from the network edge to user identity. This session explores how to implement practical, scalable Zero Trust strategies that secure access, protect data, and align with the way modern infrastructure actually works.

2:00pm -3:00pm​

Stream Lead: Paul Edmonson, Commercial Director, InspiritVision and Director and EMEA-Hub

Closing Panel:

Threat Horizon 2030: Preparing for the Next Wave of Cyber Risks

Cybersecurity threats are evolving at a faster pace than ever before. If you’re only planning for today’s risks, you’re already behind. This panel discussion will feature industry leaders sharing their predictions for the next decade and offering practical advice on how organisations can build resilience for what’s coming next.

15.30pm - 16:30pm

Charlie Taylor- Technology and Innovation Editor at Business Post

Join Our Cyber Ecosystem

Become a part of our growing Cyber Security Ecosystem. We’re Bringing everyone together!

Vendors
+
VARs & MSPs
+
Cyber Experts
+
Attendees Registered Annually
+