Main Conference Room- Session 2

Session 2: AI IN CYBERSECURITY

Attack, Defend, Govern:

The AI Security Playbook

10:45am – 11:45am

Overview:

AI is now embedded in every layer of the cybersecurity landscape. Attackers are using it to launch autonomous operations, generate convincing deepfakes and discover zero-day vulnerabilities at speed. Defenders are building AI-driven SOCs that detect and respond to threats in real time. And organisations everywhere are grappling with shadow AI, model risk and a wave of new regulation including the EU AI Act. This stream brings together security vendors at the cutting edge to address the full AI picture: offensive threats, defensive tools, governance frameworks, workforce readiness and the strategic shifts that will define secure organisations in 2026 and beyond.

Facilitator

Main Conference Room – Session 2

Picture4

Markus Melin

Co-Founder, NROC Security

Markus Melin, Product and digital transformation business leader working with global / international business. Modern and inspiring people leader with ability to grow people. Proven track record on turning around businesses to new strategic direction with start-up attitude. Markus Melin has 20+ years experience in software business with different industries. Excellent knowledge on multiple industries, such as Automotive, Finance, Insurance, Retail just to mention a few. Working with complex multi-cloud (both private and public) environments including sensor systems, driving purpose-built sales, marketing and go-to-market to a successful growth, also with M&A. Industry thought leader. In the past, running R&D and development units, working with business applications and digitalisation of enterprises – Cyber Security product development and development of Cyber Security as a Service / MSSP services. He is the Co-founder and COO in Gen AI cybersecurity.

AI in Cybersecurity: Friend, Foe, or Both?

AI is a game-changer in cybersecurity, but it’s also a double-edged sword. If attackers are using AI to breach defences, how can defenders stay ahead? This session covers real-world examples of AI in cyberattacks and how organisations can leverage AI responsibly to strengthen their security posture.

Panelists

Picture5

Michael Simpson

Senior Sales Engineer, Lookout

With a ten-year military background in highly sensitive IT infrastructure, Michael brings a rare and potent perspective to cybersecurity. His subsequent five years as a covert surveillance technician for a Commercial Spyware Vendor provided him with an insider’s view into the methodologies of sophisticated threat actors. This experience uniquely positions him to demonstrate the absolute necessity of comprehensive security measures against all tiers of adversaries. 

The escalating sophistication of mobile threats and social engineering demands intelligent and data-driven security solutions. In this session, we will focus on how Lookout established the world’s largest mobile threat intelligence corpus and how only a variety of AI technologies turn the data into actionable defence.  

Presentation on:

From Data to Defence: How AI Transforms Mobile Security Through Massive Threat Intelligence 

From Data to Defence: How AI Transforms Mobile Security Through Massive Threat Intelligence

The escalating sophistication of mobile threats and social engineering demands intelligent and data-driven security solutions. In this session, we will focus on how Lookout established the world's largest mobile threat intelligence corpus and how only a variety of AI technologies turn the data into actionable defence.  

Thomas Bell

Presales Consultant, Hornetsecurity

Thomas Bell (Tom) is one of the dedicated Presales Consultants in the Hornetsecurity support team, where he plays a vital role in guiding partners and customers through every step of their cyber onboarding and growth journey. With a strong technical background and hands-on experience working within a Managed Service Provider himself, Tom understands the real-world challenges of implementing and managing cybersecurity solutions and imparts his knowledge in manageable chunks to help businesses of all sizes bolster their defences.  

Thomas Bell, Pre-Sales Consultant at Hornetsecurity, shares three critical actions you must take now to harness AI securely ensuring it works for you, not against you. He exposes key risk areas, from misconfigured permissions, to insider threats, and external attackers exploiting AI-enabled accounts. 

Presenting on: 

AI in the Wrong Hands: The Dark Side of ChatGPT and Generative AI 

AI in the Wrong Hands: The Dark Side of ChatGPT and Generative AI

Thomas Bell, Pre-Sales Consultant at Hornetsecurity, shares three critical actions you must take now to harness AI securely ensuring it works for you, not against you. He exposes key risk areas, from misconfigured permissions, to insider threats, and external attackers exploiting AI-enabled accounts. 

Picture18

Ed Rowley

Channel Sales Engineering Director, Proofpoint

Ed Rowley has worked in Cybersecurity since 1999, working for several Security vendors in a variety of roles including positions in Marketing, Technical Support, Product Management and Sales Engineering. Ed joined Proofpoint in 2014 where he started as a Sales Engineer. After 2 years in the role, he was promoted to EMEA Commercial SE Manager and now holds the role of Director, Channel Sales Engineering for EMEA & APJ. 

In this session, we will look at how Criminal gangs have embraced AI to launch attacks ranging from simple Phishing messages to sophisticated ‘Deep Fakes’. We will look at some of the strengths and weaknesses associated with AI and review what steps the Cybersecurity Industry and Security Practitioners are taking to combat these advanced threats and also look to the future as we consider what might happen next in this rapidly moving AI arms race. 

Presenting on: 

AI Track: Deep Fakes & Deeper Threats: How Criminals Are Weaponising AI

In this session, we will look at how Criminal gangs have embraced AI to launch attacks ranging from simple Phishing messages to sophisticated ‘Deep Fakes’. We will look at some of the strengths and weaknesses associated with AI and review what steps the Cybersecurity Industry and Security Practitioners are taking to combat these advanced threats and also look to the future as we consider what might happen next in this rapidly moving AI arms race. 

Josip Dell'Olio

Director of Support, LevelBlue

Josip Dell’Olio is a leader at LevelBlue, operating at the intersection of artificial intelligence, cybersecurity, and customer success. As the elected Shaman of Section 31, LevelBlue’s AI think tank, he drives innovation and thought leadership in applied AI for cybersecurity. Known as the “Problemologist,” Josip is recognized for solving interdisciplinary challenges with actionable solutions. His expertise spans AI, security, and customer success, empowering organizations to unlock the value of emerging technologies. Josip blends technical depth with business, enabling measurable impact. He is a sought after advisor and tactical operator, bringing vision and technical rigor to engagement.

Presenting on: 

How Design Thinking and AI Unlock Business Growth

How Design Thinking and AI Unlock Business Growth

Josip Dell’Olio will show you how to innovate and stand out in a hyper productive world.

Instead of long term committing to the same AI features, you’ll learn how to rapidly ship

  • How Design Thinking combined with AI can help you create original solutions
  • How to outpace your competition: Incubate and deliver faster and smarter

Key Takeaways:

  • A practical approach to innovate authentically
  • Real world examples and actionable strategies for accelerating and outpacing

Lee Omandap

Sr. Sales Engineer

I have been at Bitdefender for over a year and previously for different AI cybersecurity vendor as a Senior Sales Engineer for four years. Which is where I discovered my interest in Artificial Intelligence, and cybersecurity. In my free time, enjoy spending time with my 3 year old daughter and wife – taking them on weekly adventures and have an interest in all things gadgets.

From Risk to Resilience: The Strategic Role of AI in Cyber Defence

In this session I will be describing how AI is useful to people and how AI can be used by malicious actors and defensively by organizations in the cybersecurity world. We will focus on how Bitdefender provides AI security solutions purpose built for protecting organizations large and small.

Cyber Conference Agenda

KeyNote:

Power, Politics and AI: The Global Forces Driving Cyber Risk in 2026

Cybersecurity is no longer just a technology problem; it’s also now a geopolitical one. State-sponsored actors are targeting critical infrastructure with increasing boldness, AI-powered political attacks are testing democratic institutions, and regulatory frameworks around data sovereignty are reshaping how organisations operate across borders. This opening keynote sets the tone for the day by examining the global forces that are driving cyber risk in 2026: from geopolitical disruption and the weaponisation of AI to the shifting regulatory landscape that every Irish organisation needs to navigate.

10:00am- 10:30am

AI IN CYBERSECURITY

Attack, Defend, Govern: The AI Security Playbook

AI is now embedded in every layer of the cybersecurity landscape. Attackers are using it to launch autonomous operations, generate convincing deepfakes and discover zero-day vulnerabilities at speed. Defenders are building AI-driven SOCs that detect and respond to threats in real time. And organisations everywhere are grappling with shadow AI, model risk and a wave of new regulation including the EU AI Act. This stream brings together security vendors at the cutting edge to address the full AI picture: offensive threats, defensive tools, governance frameworks, workforce readiness and the strategic shifts that will define secure organisations in 2026 and beyond.

10:45am- 11:4v5am

MSP & CHANNEL

Scaling Security: Building Profitable MSP Practices for 2026

MSPs serve as the frontline defence for hundreds of SMBs while managing their own operational and commercial pressures. This dedicated stream addresses security service delivery models, evolving customer expectations around compliance and cyber insurance, and practical approaches to vendor selection and stack consolidation. Speakers from successful MSPs share what’s working.

10:45am- 11:45am

DATA & INFRASTRUCTURE DEFENCE

Layered Defence: Protecting Data and Infrastructure Across Your Environment

No single control point is sufficient, and data remains the ultimate target. This session brings together endpoint, network, cloud and data security perspectives to explore how organisations can build layered defences that work together. We address EDR, next-generation firewalls, cloud workload protection, data discovery, classification and loss prevention, with particular focus on the risks introduced by generative AI adoption, the insider threat challenge, and the operational reality of tool proliferation and alert fatigue.

10:45am- 11:45am

REGULATORY COMPLIANCE & GOVERNANCE

The Compliance Reality Check: What Irish Organisations Actually Need to Do

The deadlines have passed and regulators are watching. This session moves beyond theory to examine what NIS2 and DORA compliance looks like in practice. We address incident reporting, supply chain risk requirements, board-level accountability and the documentation regulators expect, with lessons from organisations that have been through the process.

12:00pm -13:00pm

OPERATIONAL TECHNOLOGY & CRITICAL INFRASTRUCTURE

Keeping the Lights On: Protecting the Systems That Run Ireland

Attacks on operational technology environments have moved from theoretical to routine. This session addresses the unique challenges of securing environments where availability trumps confidentiality, legacy systems cannot be patched, and a breach can have physical consequences. Speakers share practical approaches to network segmentation, asset visibility and secure remote access.

12:00pm -13:00pm

RANSOMWARE & RESILIENCE

When Prevention Fails: Ransomware, Recovery and Operational Resilience

The question is no longer whether you’ll face a serious incident but how quickly you can recover. With ransomware attacks increasing in volume and sophistication, this session addresses the full lifecycle from prevention through to containment and recovery. We examine the critical importance of immutable backups, tested recovery procedures, and the often-overlooked challenge of Active Directory restoration.

12:00pm -13:00pm​

IDENTITY, DECEPTION & HUMAN RISK

Identity Compromise, Deception and the Human Attack Surface

Attackers don’t need to find a vulnerability when they can steal a credential or trick a human. From AI-generated phishing that’s virtually indistinguishable from legitimate communication to credential theft, privilege escalation and Active Directory compromise, the most common path into organisations now runs through people and their identities. This session examines how social engineering and identity attacks are converging, why Zero Trust must address both technical controls and human factors, and what practical defences look like when the threat is designed to bypass every instinct your users rely on.

14:00pm  - 15:00pm

EMERGING THREATS

From Deepfakes to Quantum: The Next Wave of Threats You Need to Prepare for Now

Deepfake technology is already being used to impersonate executives and bypass verification. Quantum computing threatens to undermine the encryption we rely on today. And geopolitical shifts are reshaping who is targeting whom and why. This session cuts through the noise to examine the emerging threats that Irish organisations need to take seriously now, not in five years’ time, and provides practical frameworks for building preparedness into your security strategy today.

14:00pm  - 15:00pm

TBD

TBD

2:00pm -3:00pm​

Closing Panel:

Security Leadership 2026: What Keeps CISOs Awake at Night

The day has covered a lot of ground, from geopolitical disruption and AI-powered attacks to regulatory pressure, ransomware resilience and the challenge of protecting critical infrastructure. In this closing panel, security leaders from across Irish industry reflect on what they’ve heard, share what resonates most with their own organisations, and offer a candid perspective on the decisions that will define cybersecurity leadership in the year ahead. Expect honest conversation about skills shortages, board-level expectations, AI governance and what it actually takes to keep an organisation secure in 2026.

15.30pm - 16:30pm

Join Our Cyber Ecosystem

Become a part of our growing Cyber Security Ecosystem. We’re Bringing everyone together!

Vendors
+
VARs & MSPs
+
Cyber Experts
+
Attendees Registered Annually
+