Now In Conjunction With:

Overview:
A practical guide to identifying and fixing vulnerabilities across your supply chain before attackers exploit them. If your vendors aren’t secure, you aren’t either. This session covers real-world tactics to shore up your supply chain defences.

Bar (Upstairs) RM2 – Session 2
Facilitator


Padraigh Griffin, CCRS NCSE P.D. Cyber MBA
Chief Executive Officer, Irish Information Security Agency
Pádraigh is an accomplished C-Level Executive with over 20 years of experience driving enterprise ICT, Cloud, Digital Transformation Cybersecurity, GRC and AI innovation across diverse industries, including private, semi state and government organisations. Renowned for leading complex business and technology transformation programs, Pádraigh now leads the Irish Information Security Agency. The Irish Information Security Agency (IISA) is a newly established, forward-thinking membership organisation created specifically to address the evolving cybersecurity, GRC, Artificial Intelligence and digital resilience needs of Irish small and medium-sized enterprises (SMEs). At a time when cyber threats are escalating and digital transformation is accelerating, IISA recognises the unique vulnerabilities of modern SMEs—and exists to ensure they are protected, empowered, and supported.
Panelists


Lee Coventry
Solution Architect, SecurityScorecard
With over 15 years experience in cybersecurity, Lee Coventry has expertise across a broad range of solutions, including threat detection and response, identity services and cyber risk management. Lee has successfully helped numerous organisations safeguard their digital assets and strengthen their security posture.
Presentation on:
Reducing the cyber risks from blind spots in your vendor ecosystem
Recent research revealed that over the last two years, 98% of organisations globally have had a third party in their ecosystem that has experienced a breach.
To mitigate these threats, this session will explore best practices to optimise your supply chain risk management program.
You will discover how to:
- Get full visibility of your attack surface
- Evolve from point-in-time vendor questionnaires to continuous monitoring of your third parties
- Uncover supply chain threats before they impact your organisation
- Improve efficiency and automate workflows
- Accelerate compliance with regulatory frameworks


Hakan Uzun
CEO, Brandefense
Hakan Uzun is a seasoned technology and cybersecurity executive with over 35 years of experience in sales, business development, and strategic leadership. He has held key leadership roles at globally recognized companies, including Siemens, Motorola, Forcepoint, and McAfee, where he played a pivotal role in market expansion and innovation. In 2023, he took on the CEO role at Brandefense, where he spearheads the company’s global expansion and drives the development of cutting-edge cybersecurity solutions. Under his leadership, Brandefense has strengthened its market presence, delivering advanced digital risk protection and threat intelligence solutions to organizations worldwide.
Presenting on:
Beyond Trust: TPRM as the Cornerstone of Supply Chain Security
Organisations increasingly rely on third-party vendors and outsourced services in today's interconnected digital ecosystem to remain agile and competitive. However, with convenience comes complexity - and risk. This session examines how Third-Party Risk Management (TPRM) plays a vital role in strengthening supply chain security by uncovering hidden risks, reducing attack surfaces, and providing continuous visibility into your extended ecosystem.


Patrick Brennan
Partner Sales EMEA, CybelAngel
Patrick serves as the Global Partner Sales Director at CybelAngel, where he is responsible for growing and scaling MSSP and resale partnerships. With a broad background in the IT industry, Patrick has worked with leading multinational companies like Cisco and Apple, as well as dynamic start-ups. Over the past six years, his focus has been on developing and nurturing cybersecurity partner ecosystems, helping businesses leverage strategic alliances to drive growth and innovation in the cybersecurity space.
Presentation on:
TBC
Cyber Conference Agenda
KeyNote:
AI is transforming the cybersecurity landscape at an unprecedented rate, creating new opportunities for both attackers and defenders. If your organisation isn’t adapting, it risks falling behind. This keynote will unpack how AI is shaping the future of cyber threats—and what you must do now to stay one step ahead.
- Main Conference Room
10:00am- 10:30am
Paul C Dwyer, CEO, Cyber Risk International
AI is a game-changer in cybersecurity, but it’s also a double-edged sword. If attackers are using AI to breach defences, how can defenders stay ahead? This session covers real-world examples of AI in cyberattacks and how organisations can leverage AI responsibly to strengthen their security posture.
- Main Conference Room
10:40am- 11:55am
Stream Lead: Markus Melin, Founder, NROC
Cybersecurity has shifted from a product to a service. This session explores how Managed Security Service Providers (MSSPs) have transformed traditional cybersecurity approaches into scalable, service-driven models. Learn how organisations can take advantage of these services to mitigate risk and manage threats in real-time.
- Bar (upstairs)
10:45am- 11:45am
Stream Lead: David McCullough- Chief Commercial Officer, Xsell
Ransomware attacks have evolved far beyond simple encryption. Today’s attackers use tactics like double extortion, where they both encrypt data and threaten to leak it. If your organisation doesn’t have a solid ransomware response plan, you’re a target. This session covers how ransomware is changing and how to stay one step ahead.
- Downstairs Room 3
10:45am- 11:45am
Stream Lead: To Be Announced
Human error remains one of the biggest causes of cyber breaches. If your staff aren’t following basic cybersecurity practices, your defences are already compromised. This session covers practical, effective ways to improve cyber hygiene across your organisation - without overwhelming your team with technical jargon.
12:15pm -13:15pm
- Main Conference Room
Stream Lead: To Be Announced
A practical guide to identifying and fixing vulnerabilities across your supply chain before attackers exploit them. If your vendors aren’t secure, you aren’t either. This session covers real-world tactics to shore up your supply chain defences.
- Bar (upstairs)
12:00pm -13:00pm
Stream Lead: To Be Announced
Cyber resilience isn’t just about having the right tools - it’s about embedding security into the very fabric of your organisation. Attackers exploit both human error and technical weaknesses, so how do you build defences that cover both? This session goes beyond firewalls and frameworks, focusing on how to develop a culture of security strategy where people and technology work together to withstand, adapt to, and recover from cyber threats. We’ll explore how to upskill teams, foster security-first mindsets, and implement adaptive technologies that keep you ahead of evolving risks. Expect practical insights and actionable steps to make resilience a core part of your organisation’s DNA.
- Downstairs Room 3
12:00pm -13:00pm
Stream Lead: Paul Hearns, Business Owner at PJH Consulting
Many organisations think meeting regulatory compliance standards is enough to keep them secure. It isn’t. If your focus stops at compliance, you’re leaving gaps attackers can exploit. This session explores how to go beyond regulatory requirements and build a security strategy that protects your organisation from real-world threats.
- Main Conference Room
14:00pm - 15:10pm
Stream Lead:Paul C Dwyer, CEO, Cyber Risk International
The future of AV integration in Ireland is rapidly evolving, driven by advancements in technology and the increasing demand for seamless, intelligent systems. From smart meeting rooms and immersive education environments to cutting-edge entertainment systems, the potential for AV technologies to transform how we communicate and collaborate is immense. This session will explore the exciting opportunities and challenges in integrating AV solutions with modern IT infrastructures.
- Bar (upstairs)
14:00pm - 15:00pm
Stream Lead: To Be Announced
Cloud environments demand more than patchwork defence - they require security by design. As organisations move into the next phase of cloud adoption, Zero Trust must be embedded throughout the architecture, from the network edge to user identity. This session explores how to implement practical, scalable Zero Trust strategies that secure access, protect data, and align with the way modern infrastructure actually works.
- Downstairs Room 3
2:00pm -3:00pm
Stream Lead: Paul Edmonson, Commercial Director, InspiritVision and Director and EMEA-Hub
Closing Panel:
Cybersecurity threats are evolving at a faster pace than ever before. If you’re only planning for today’s risks, you’re already behind. This panel discussion will feature industry leaders sharing their predictions for the next decade and offering practical advice on how organisations can build resilience for what’s coming next.
- Main Conference Room
15.30pm - 16:30pm
Charlie Taylor- Technology and Innovation Editor at Business Post
Join Our Cyber Ecosystem
Become a part of our growing Cyber Security Ecosystem. We’re Bringing everyone together!