Bar (Upstairs) RM2 – Session 2

Session 2

Supply Chain Security

Your Weakest Link is Their Way In

Time: 14:00 – 15:00

Now In Conjunction With:

Overview:

A practical guide to identifying and fixing vulnerabilities across your supply chain before attackers exploit them. If your vendors aren’t secure, you aren’t either. This session covers real-world tactics to shore up your supply chain defences.

Bar (Upstairs) RM2 – Session 2

Facilitator

Padraigh Griffin, CCRS NCSE P.D. Cyber MBA

Chief Executive Officer, Irish Information Security Agency

Pádraigh is an accomplished C-Level Executive with over 20 years of experience driving enterprise ICT, Cloud, Digital Transformation Cybersecurity, GRC and AI innovation across diverse industries, including private, semi state and government organisations. Renowned for leading complex business and technology transformation programs, Pádraigh now leads the Irish Information Security Agency. The Irish Information Security Agency (IISA) is a newly established, forward-thinking membership organisation created specifically to address the evolving cybersecurity, GRC, Artificial Intelligence and digital resilience needs of Irish small and medium-sized enterprises (SMEs). At a time when cyber threats are escalating and digital transformation is accelerating, IISA recognises the unique vulnerabilities of modern SMEs—and exists to ensure they are protected, empowered, and supported.

Panelists

Lee Coventry

Solution Architect, SecurityScorecard

With over 15 years experience in cybersecurity, Lee Coventry has expertise across a broad range of solutions, including threat detection and response, identity services and cyber risk management. Lee has successfully helped numerous organisations safeguard their digital assets and strengthen their security posture. 

Presentation on:

Reducing the cyber risks from blind spots in your vendor ecosystem 

Reducing the cyber risks from blind spots in your vendor ecosystem

Recent research revealed that over the last two years, 98% of organisations globally have had a third party in their ecosystem that has experienced a breach. 

To mitigate these threats, this session will explore best practices to optimise your supply chain risk management program.  

You will discover how to: 

  • Get full visibility of your attack surface 
  • Evolve from point-in-time vendor questionnaires to continuous monitoring of your third parties 
  • Uncover supply chain threats before they impact your organisation 
  • Improve efficiency and automate workflows 
  • Accelerate compliance with regulatory frameworks  

Hakan Uzun

CEO, Brandefense

Hakan Uzun is a seasoned technology and cybersecurity executive with over 35 years of experience in sales, business development, and strategic leadership. He has held key leadership roles at globally recognized companies, including Siemens, Motorola, Forcepoint, and McAfee, where he played a pivotal role in market expansion and innovation. In 2023, he took on the CEO role at Brandefense, where he spearheads the company’s global expansion and drives the development of cutting-edge cybersecurity solutions. Under his leadership, Brandefense has strengthened its market presence, delivering advanced digital risk protection and threat intelligence solutions to organizations worldwide.

Presenting on: 

Beyond Trust: TPRM as the Cornerstone of Supply Chain Security

Beyond Trust: TPRM as the Cornerstone of Supply Chain Security

Organisations increasingly rely on third-party vendors and outsourced services in today's interconnected digital ecosystem to remain agile and competitive. However, with convenience comes complexity - and risk. This session examines how Third-Party Risk Management (TPRM) plays a vital role in strengthening supply chain security by uncovering hidden risks, reducing attack surfaces, and providing continuous visibility into your extended ecosystem.

Patrick Brennan

Partner Sales EMEA, CybelAngel

Patrick serves as the Global Partner Sales Director at CybelAngel, where he is responsible for growing and scaling MSSP and resale partnerships. With a broad background in the IT industry, Patrick has worked with leading multinational companies like Cisco and Apple, as well as dynamic start-ups. Over the past six years, his focus has been on developing and nurturing cybersecurity partner ecosystems, helping businesses leverage strategic alliances to drive growth and innovation in the cybersecurity space. 

Presentation on:

TBC

Cyber Conference Agenda

KeyNote:

The Cyber Arms Race: Winning in a World of AI-Powered Threats

AI is transforming the cybersecurity landscape at an unprecedented rate, creating new opportunities for both attackers and defenders. If your organisation isn’t adapting, it risks falling behind. This keynote will unpack how AI is shaping the future of cyber threats—and what you must do now to stay one step ahead.

10:00am- 10:30am

Paul C Dwyer, CEO, Cyber Risk International

AI in Cybersecurity: Friend, Foe, or Both?

AI is a game-changer in cybersecurity, but it’s also a double-edged sword. If attackers are using AI to breach defences, how can defenders stay ahead? This session covers real-world examples of AI in cyberattacks and how organisations can leverage AI responsibly to strengthen their security posture.

10:40am- 11:55am

Stream Lead: Markus Melin, Founder, NROC

The Evolution and Future of MSSPs

Cybersecurity has shifted from a product to a service. This session explores how Managed Security Service Providers (MSSPs) have transformed traditional cybersecurity approaches into scalable, service-driven models. Learn how organisations can take advantage of these services to mitigate risk and manage threats in real-time.

10:45am- 11:45am

Stream Lead: David McCullough- Chief Commercial Officer, Xsell

Ransomware Reloaded: Navigating the Evolution of Cyber Extortion

Ransomware attacks have evolved far beyond simple encryption. Today’s attackers use tactics like double extortion, where they both encrypt data and threaten to leak it. If your organisation doesn’t have a solid ransomware response plan, you’re a target. This session covers how ransomware is changing and how to stay one step ahead.

10:45am- 11:45am

Stream Lead: To Be Announced

Fixing Human Error: The Weakest Link Is Still the Strongest Threat

Human error remains one of the biggest causes of cyber breaches. If your staff aren’t following basic cybersecurity practices, your defences are already compromised. This session covers practical, effective ways to improve cyber hygiene across your organisation - without overwhelming your team with technical jargon.

12:15pm -13:15pm

Stream Lead: To Be Announced

Supply Chain Security: Your Weakest Link is Their Way In

A practical guide to identifying and fixing vulnerabilities across your supply chain before attackers exploit them. If your vendors aren’t secure, you aren’t either. This session covers real-world tactics to shore up your supply chain defences.

12:00pm -13:00pm

Stream Lead: To Be Announced

Building Cyber Resilience: Empowering People and Technology

Cyber resilience isn’t just about having the right tools - it’s about embedding security into the very fabric of your organisation. Attackers exploit both human error and technical weaknesses, so how do you build defences that cover both? This session goes beyond firewalls and frameworks, focusing on how to develop a culture of security strategy where people and technology work together to withstand, adapt to, and recover from cyber threats. We’ll explore how to upskill teams, foster security-first mindsets, and implement adaptive technologies that keep you ahead of evolving risks. Expect practical insights and actionable steps to make resilience a core part of your organisation’s DNA.

12:00pm -13:00pm​

Stream Lead: Paul Hearns, Business Owner at PJH Consulting

The Compliance Trap: Why Being ‘Secure Enough’ Won’t Cut It in the Era of DORA and NIS2

Many organisations think meeting regulatory compliance standards is enough to keep them secure. It isn’t. If your focus stops at compliance, you’re leaving gaps attackers can exploit. This session explores how to go beyond regulatory requirements and build a security strategy that protects your organisation from real-world threats.

14:00pm  - 15:10pm

Stream Lead:Paul C Dwyer, CEO, Cyber Risk International

The Future of AV Integration in Ireland

The future of AV integration in Ireland is rapidly evolving, driven by advancements in technology and the increasing demand for seamless, intelligent systems. From smart meeting rooms and immersive education environments to cutting-edge entertainment systems, the potential for AV technologies to transform how we communicate and collaborate is immense. This session will explore the exciting opportunities and challenges in integrating AV solutions with modern IT infrastructures.

14:00pm  - 15:00pm

Stream Lead: To Be Announced

The Next Phase of Cloud Security: Embedding Zero Trust from Edge to Identity

Cloud environments demand more than patchwork defence - they require security by design. As organisations move into the next phase of cloud adoption, Zero Trust must be embedded throughout the architecture, from the network edge to user identity. This session explores how to implement practical, scalable Zero Trust strategies that secure access, protect data, and align with the way modern infrastructure actually works.

2:00pm -3:00pm​

Stream Lead: Paul Edmonson, Commercial Director, InspiritVision and Director and EMEA-Hub

Closing Panel:

Threat Horizon 2030: Preparing for the Next Wave of Cyber Risks

Cybersecurity threats are evolving at a faster pace than ever before. If you’re only planning for today’s risks, you’re already behind. This panel discussion will feature industry leaders sharing their predictions for the next decade and offering practical advice on how organisations can build resilience for what’s coming next.

15.30pm - 16:30pm

Charlie Taylor- Technology and Innovation Editor at Business Post

Join Our Cyber Ecosystem

Become a part of our growing Cyber Security Ecosystem. We’re Bringing everyone together!

Vendors
+
VARs & MSPs
+
Cyber Experts
+
Attendees Registered Annually
+