Session 2: AI IN CYBERSECURITY
Attack, Defend, Govern:
The AI Security Playbook
10:45am – 11:45am
Overview:
AI is now embedded in every layer of the cybersecurity landscape. Attackers are using it to launch autonomous operations, generate convincing deepfakes and discover zero-day vulnerabilities at speed. Defenders are building AI-driven SOCs that detect and respond to threats in real time. And organisations everywhere are grappling with shadow AI, model risk and a wave of new regulation including the EU AI Act. This stream brings together security vendors at the cutting edge to address the full AI picture: offensive threats, defensive tools, governance frameworks, workforce readiness and the strategic shifts that will define secure organisations in 2026 and beyond.
Facilitator
Main Conference Room – Session 2
Markus Melin
Co-Founder, NROC Security
Markus Melin, Product and digital transformation business leader working with global / international business. Modern and inspiring people leader with ability to grow people. Proven track record on turning around businesses to new strategic direction with start-up attitude. Markus Melin has 20+ years experience in software business with different industries. Excellent knowledge on multiple industries, such as Automotive, Finance, Insurance, Retail just to mention a few. Working with complex multi-cloud (both private and public) environments including sensor systems, driving purpose-built sales, marketing and go-to-market to a successful growth, also with M&A. Industry thought leader. In the past, running R&D and development units, working with business applications and digitalisation of enterprises – Cyber Security product development and development of Cyber Security as a Service / MSSP services. He is the Co-founder and COO in Gen AI cybersecurity.
AI is a game-changer in cybersecurity, but it’s also a double-edged sword. If attackers are using AI to breach defences, how can defenders stay ahead? This session covers real-world examples of AI in cyberattacks and how organisations can leverage AI responsibly to strengthen their security posture.
Panelists
Michael Simpson
Senior Sales Engineer, Lookout
With a ten-year military background in highly sensitive IT infrastructure, Michael brings a rare and potent perspective to cybersecurity. His subsequent five years as a covert surveillance technician for a Commercial Spyware Vendor provided him with an insider’s view into the methodologies of sophisticated threat actors. This experience uniquely positions him to demonstrate the absolute necessity of comprehensive security measures against all tiers of adversaries.
The escalating sophistication of mobile threats and social engineering demands intelligent and data-driven security solutions. In this session, we will focus on how Lookout established the world’s largest mobile threat intelligence corpus and how only a variety of AI technologies turn the data into actionable defence.
Presentation on:
From Data to Defence: How AI Transforms Mobile Security Through Massive Threat Intelligence
The escalating sophistication of mobile threats and social engineering demands intelligent and data-driven security solutions. In this session, we will focus on how Lookout established the world's largest mobile threat intelligence corpus and how only a variety of AI technologies turn the data into actionable defence.
Thomas Bell
Presales Consultant, Hornetsecurity
Thomas Bell (Tom) is one of the dedicated Presales Consultants in the Hornetsecurity support team, where he plays a vital role in guiding partners and customers through every step of their cyber onboarding and growth journey. With a strong technical background and hands-on experience working within a Managed Service Provider himself, Tom understands the real-world challenges of implementing and managing cybersecurity solutions and imparts his knowledge in manageable chunks to help businesses of all sizes bolster their defences.
Thomas Bell, Pre-Sales Consultant at Hornetsecurity, shares three critical actions you must take now to harness AI securely ensuring it works for you, not against you. He exposes key risk areas, from misconfigured permissions, to insider threats, and external attackers exploiting AI-enabled accounts.
Presenting on:
AI in the Wrong Hands: The Dark Side of ChatGPT and Generative AI
Thomas Bell, Pre-Sales Consultant at Hornetsecurity, shares three critical actions you must take now to harness AI securely ensuring it works for you, not against you. He exposes key risk areas, from misconfigured permissions, to insider threats, and external attackers exploiting AI-enabled accounts.
Ed Rowley
Channel Sales Engineering Director, Proofpoint
Ed Rowley has worked in Cybersecurity since 1999, working for several Security vendors in a variety of roles including positions in Marketing, Technical Support, Product Management and Sales Engineering. Ed joined Proofpoint in 2014 where he started as a Sales Engineer. After 2 years in the role, he was promoted to EMEA Commercial SE Manager and now holds the role of Director, Channel Sales Engineering for EMEA & APJ.
In this session, we will look at how Criminal gangs have embraced AI to launch attacks ranging from simple Phishing messages to sophisticated ‘Deep Fakes’. We will look at some of the strengths and weaknesses associated with AI and review what steps the Cybersecurity Industry and Security Practitioners are taking to combat these advanced threats and also look to the future as we consider what might happen next in this rapidly moving AI arms race.
Presenting on:
AI Track: Deep Fakes & Deeper Threats: How Criminals Are Weaponising AI
In this session, we will look at how Criminal gangs have embraced AI to launch attacks ranging from simple Phishing messages to sophisticated ‘Deep Fakes’. We will look at some of the strengths and weaknesses associated with AI and review what steps the Cybersecurity Industry and Security Practitioners are taking to combat these advanced threats and also look to the future as we consider what might happen next in this rapidly moving AI arms race.
Josip Dell'Olio
Director of Support, LevelBlue
Josip Dell’Olio is a leader at LevelBlue, operating at the intersection of artificial intelligence, cybersecurity, and customer success. As the elected Shaman of Section 31, LevelBlue’s AI think tank, he drives innovation and thought leadership in applied AI for cybersecurity. Known as the “Problemologist,” Josip is recognized for solving interdisciplinary challenges with actionable solutions. His expertise spans AI, security, and customer success, empowering organizations to unlock the value of emerging technologies. Josip blends technical depth with business, enabling measurable impact. He is a sought after advisor and tactical operator, bringing vision and technical rigor to engagement.
Presenting on:
How Design Thinking and AI Unlock Business Growth
Josip Dell’Olio will show you how to innovate and stand out in a hyper productive world.
Instead of long term committing to the same AI features, you’ll learn how to rapidly ship
- How Design Thinking combined with AI can help you create original solutions
- How to outpace your competition: Incubate and deliver faster and smarter
Key Takeaways:
- A practical approach to innovate authentically
- Real world examples and actionable strategies for accelerating and outpacing
Lee Omandap
Sr. Sales Engineer
I have been at Bitdefender for over a year and previously for different AI cybersecurity vendor as a Senior Sales Engineer for four years. Which is where I discovered my interest in Artificial Intelligence, and cybersecurity. In my free time, enjoy spending time with my 3 year old daughter and wife – taking them on weekly adventures and have an interest in all things gadgets.
In this session I will be describing how AI is useful to people and how AI can be used by malicious actors and defensively by organizations in the cybersecurity world. We will focus on how Bitdefender provides AI security solutions purpose built for protecting organizations large and small.
Cyber Conference Agenda
KeyNote:
Cybersecurity is no longer just a technology problem; it’s also now a geopolitical one. State-sponsored actors are targeting critical infrastructure with increasing boldness, AI-powered political attacks are testing democratic institutions, and regulatory frameworks around data sovereignty are reshaping how organisations operate across borders. This opening keynote sets the tone for the day by examining the global forces that are driving cyber risk in 2026: from geopolitical disruption and the weaponisation of AI to the shifting regulatory landscape that every Irish organisation needs to navigate.
- Main Conference Room
10:00am- 10:30am
AI IN CYBERSECURITY
AI is now embedded in every layer of the cybersecurity landscape. Attackers are using it to launch autonomous operations, generate convincing deepfakes and discover zero-day vulnerabilities at speed. Defenders are building AI-driven SOCs that detect and respond to threats in real time. And organisations everywhere are grappling with shadow AI, model risk and a wave of new regulation including the EU AI Act. This stream brings together security vendors at the cutting edge to address the full AI picture: offensive threats, defensive tools, governance frameworks, workforce readiness and the strategic shifts that will define secure organisations in 2026 and beyond.
- Main Conference Room
10:45am- 11:4v5am
MSP & CHANNEL
MSPs serve as the frontline defence for hundreds of SMBs while managing their own operational and commercial pressures. This dedicated stream addresses security service delivery models, evolving customer expectations around compliance and cyber insurance, and practical approaches to vendor selection and stack consolidation. Speakers from successful MSPs share what’s working.
- Bar (upstairs)
10:45am- 11:45am
DATA & INFRASTRUCTURE DEFENCE
No single control point is sufficient, and data remains the ultimate target. This session brings together endpoint, network, cloud and data security perspectives to explore how organisations can build layered defences that work together. We address EDR, next-generation firewalls, cloud workload protection, data discovery, classification and loss prevention, with particular focus on the risks introduced by generative AI adoption, the insider threat challenge, and the operational reality of tool proliferation and alert fatigue.
- Downstairs Room 3
10:45am- 11:45am
REGULATORY COMPLIANCE & GOVERNANCE
The deadlines have passed and regulators are watching. This session moves beyond theory to examine what NIS2 and DORA compliance looks like in practice. We address incident reporting, supply chain risk requirements, board-level accountability and the documentation regulators expect, with lessons from organisations that have been through the process.
12:00pm -13:00pm
- Main Conference Room
OPERATIONAL TECHNOLOGY & CRITICAL INFRASTRUCTURE
Attacks on operational technology environments have moved from theoretical to routine. This session addresses the unique challenges of securing environments where availability trumps confidentiality, legacy systems cannot be patched, and a breach can have physical consequences. Speakers share practical approaches to network segmentation, asset visibility and secure remote access.
- Bar (upstairs)
12:00pm -13:00pm
RANSOMWARE & RESILIENCE
The question is no longer whether you’ll face a serious incident but how quickly you can recover. With ransomware attacks increasing in volume and sophistication, this session addresses the full lifecycle from prevention through to containment and recovery. We examine the critical importance of immutable backups, tested recovery procedures, and the often-overlooked challenge of Active Directory restoration.
- Downstairs Room 3
12:00pm -13:00pm
IDENTITY, DECEPTION & HUMAN RISK
Attackers don’t need to find a vulnerability when they can steal a credential or trick a human. From AI-generated phishing that’s virtually indistinguishable from legitimate communication to credential theft, privilege escalation and Active Directory compromise, the most common path into organisations now runs through people and their identities. This session examines how social engineering and identity attacks are converging, why Zero Trust must address both technical controls and human factors, and what practical defences look like when the threat is designed to bypass every instinct your users rely on.
- Main Conference Room
14:00pm - 15:00pm
EMERGING THREATS
Deepfake technology is already being used to impersonate executives and bypass verification. Quantum computing threatens to undermine the encryption we rely on today. And geopolitical shifts are reshaping who is targeting whom and why. This session cuts through the noise to examine the emerging threats that Irish organisations need to take seriously now, not in five years’ time, and provides practical frameworks for building preparedness into your security strategy today.
- Bar (upstairs)
14:00pm - 15:00pm
Closing Panel:
The day has covered a lot of ground, from geopolitical disruption and AI-powered attacks to regulatory pressure, ransomware resilience and the challenge of protecting critical infrastructure. In this closing panel, security leaders from across Irish industry reflect on what they’ve heard, share what resonates most with their own organisations, and offer a candid perspective on the decisions that will define cybersecurity leadership in the year ahead. Expect honest conversation about skills shortages, board-level expectations, AI governance and what it actually takes to keep an organisation secure in 2026.
- Main Conference Room
15.30pm - 16:30pm
Join Our Cyber Ecosystem
Become a part of our growing Cyber Security Ecosystem. We’re Bringing everyone together!

