Main Conference Room – Session 3

Session 3: REGULATORY COMPLIANCE & GOVERNANCE

The Compliance Reality Check:

What Irish Organisations Actually Need to Do

12:00pm – 13:00pm

Overview:

The deadlines have passed and regulators are watching. This session moves beyond theory to examine what NIS2 and DORA compliance looks like in practice. We address incident reporting, supply chain risk requirements, board-level accountability and the documentation regulators expect, with lessons from organisations that have been through the process.

Downstairs RM3 – Session 1

Facilitator

Dr. Vivienne Mee

Founder VM Group

Vivienne has worked on large electronic discovery cases both in Ireland and across Europe with various forensic teams. As part of her PhD studies, Vivienne was a member of the Information Security Research Group at the University of Glamorgan. Here she spent a number of years working at their Forensic Laboratory, investigating cybercrimes and latest trends which fed into extensive research with the Serious Organised Crime Agency (SOCA), Ministry of Defence, Defence Science & Technology Labs and UK Security Service (MI5).

Panelists

Patrick Brennan

Partner Sales EMEA, CybelAngel

Patrick serves as the Global Partner Sales Director at CybelAngel, where he is responsible for growing and scaling MSSP and resale partnerships. With a broad background in the IT industry, Patrick has worked with leading multinational companies like Cisco and Apple, as well as dynamic start-ups. Over the past six years, his focus has been on developing and nurturing cybersecurity partner ecosystems, helping businesses leverage strategic alliances to drive growth and innovation in the cybersecurity space. 

Presentation on:

Ransomware Threat Intelligence: Uncovering Insights and Defending Against the Evolving Risk

Ransomware Threat Intelligence: Uncovering Insights and Defending Against the Evolving Risk

Ransomware attacks are more sophisticated than ever, with Irish organisations becoming increasingly targeted. Pat Brennan, Global Partner Sales Director at CybelAngel, will reveal the latest strategies used by ransomware gangs, including hidden entry points they exploit beyond stolen credentials.

Morten Gammelgard

Co-Founder & Global CRO

Morten lives in London and has 25 years of experience in the cybersecurity industry. Morten is Executive Vice President of BullWall and leads the company’s commercial department, focusing on building an effective distribution network and enhancing customer satisfaction. He is an accomplished security leader, experienced in leading teams that have supported the world’s largest companies dramatically improve their security posture. Morten has held leadership positions in a number of technology companies, such as Sophos, VMware and Ivanti.

Presenting on: 

Breaking the Chain: Ransomware Defense That Meets ALL Compliance Standards

Breaking the Chain: Ransomware Defense That Meets ALL Compliance Standards

As cyber threats grow more sophisticated, organisations must strengthen their resilience to safeguard critical operations from ransomware and other attacks. This session, led by BullWall, will provide essential strategies for maintaining business continuity and ensuring rapid recovery from cyber incidents.

Join Morten Gammelgard as he explores:

  • How ransomware and other cyber threats really bypass preventative security solutions
  • The role of BullWall’s containment solution in maintaining operational continuity during an attack
  • Proven strategies to prevent phishing, impersonation threats, and automated exploits
  • Best practices for enhancing incident response and minimizing downtime

Ensure your organization remains resilient in the face of evolving cyber threats—don’t wait until it’s too late.

Cyber Conference Agenda

KeyNote:

Power, Politics and AI: The Global Forces Driving Cyber Risk in 2026

Cybersecurity is no longer just a technology problem; it’s also now a geopolitical one. State-sponsored actors are targeting critical infrastructure with increasing boldness, AI-powered political attacks are testing democratic institutions, and regulatory frameworks around data sovereignty are reshaping how organisations operate across borders. This opening keynote sets the tone for the day by examining the global forces that are driving cyber risk in 2026: from geopolitical disruption and the weaponisation of AI to the shifting regulatory landscape that every Irish organisation needs to navigate.

10:00am- 10:30am

AI IN CYBERSECURITY

Attack, Defend, Govern: The AI Security Playbook

AI is now embedded in every layer of the cybersecurity landscape. Attackers are using it to launch autonomous operations, generate convincing deepfakes and discover zero-day vulnerabilities at speed. Defenders are building AI-driven SOCs that detect and respond to threats in real time. And organisations everywhere are grappling with shadow AI, model risk and a wave of new regulation including the EU AI Act. This stream brings together security vendors at the cutting edge to address the full AI picture: offensive threats, defensive tools, governance frameworks, workforce readiness and the strategic shifts that will define secure organisations in 2026 and beyond.

10:45am- 11:4v5am

MSP & CHANNEL

Scaling Security: Building Profitable MSP Practices for 2026

MSPs serve as the frontline defence for hundreds of SMBs while managing their own operational and commercial pressures. This dedicated stream addresses security service delivery models, evolving customer expectations around compliance and cyber insurance, and practical approaches to vendor selection and stack consolidation. Speakers from successful MSPs share what’s working.

10:45am- 11:45am

DATA & INFRASTRUCTURE DEFENCE

Layered Defence: Protecting Data and Infrastructure Across Your Environment

No single control point is sufficient, and data remains the ultimate target. This session brings together endpoint, network, cloud and data security perspectives to explore how organisations can build layered defences that work together. We address EDR, next-generation firewalls, cloud workload protection, data discovery, classification and loss prevention, with particular focus on the risks introduced by generative AI adoption, the insider threat challenge, and the operational reality of tool proliferation and alert fatigue.

10:45am- 11:45am

REGULATORY COMPLIANCE & GOVERNANCE

The Compliance Reality Check: What Irish Organisations Actually Need to Do

The deadlines have passed and regulators are watching. This session moves beyond theory to examine what NIS2 and DORA compliance looks like in practice. We address incident reporting, supply chain risk requirements, board-level accountability and the documentation regulators expect, with lessons from organisations that have been through the process.

12:00pm -13:00pm

OPERATIONAL TECHNOLOGY & CRITICAL INFRASTRUCTURE

Keeping the Lights On: Protecting the Systems That Run Ireland

Attacks on operational technology environments have moved from theoretical to routine. This session addresses the unique challenges of securing environments where availability trumps confidentiality, legacy systems cannot be patched, and a breach can have physical consequences. Speakers share practical approaches to network segmentation, asset visibility and secure remote access.

12:00pm -13:00pm

RANSOMWARE & RESILIENCE

When Prevention Fails: Ransomware, Recovery and Operational Resilience

The question is no longer whether you’ll face a serious incident but how quickly you can recover. With ransomware attacks increasing in volume and sophistication, this session addresses the full lifecycle from prevention through to containment and recovery. We examine the critical importance of immutable backups, tested recovery procedures, and the often-overlooked challenge of Active Directory restoration.

12:00pm -13:00pm​

IDENTITY, DECEPTION & HUMAN RISK

Identity Compromise, Deception and the Human Attack Surface

Attackers don’t need to find a vulnerability when they can steal a credential or trick a human. From AI-generated phishing that’s virtually indistinguishable from legitimate communication to credential theft, privilege escalation and Active Directory compromise, the most common path into organisations now runs through people and their identities. This session examines how social engineering and identity attacks are converging, why Zero Trust must address both technical controls and human factors, and what practical defences look like when the threat is designed to bypass every instinct your users rely on.

14:00pm  - 15:00pm

EMERGING THREATS

From Deepfakes to Quantum: The Next Wave of Threats You Need to Prepare for Now

Deepfake technology is already being used to impersonate executives and bypass verification. Quantum computing threatens to undermine the encryption we rely on today. And geopolitical shifts are reshaping who is targeting whom and why. This session cuts through the noise to examine the emerging threats that Irish organisations need to take seriously now, not in five years’ time, and provides practical frameworks for building preparedness into your security strategy today.

14:00pm  - 15:00pm

TBD

TBD

2:00pm -3:00pm​

Closing Panel:

Security Leadership 2026: What Keeps CISOs Awake at Night

The day has covered a lot of ground, from geopolitical disruption and AI-powered attacks to regulatory pressure, ransomware resilience and the challenge of protecting critical infrastructure. In this closing panel, security leaders from across Irish industry reflect on what they’ve heard, share what resonates most with their own organisations, and offer a candid perspective on the decisions that will define cybersecurity leadership in the year ahead. Expect honest conversation about skills shortages, board-level expectations, AI governance and what it actually takes to keep an organisation secure in 2026.

15.30pm - 16:30pm

Join Our Cyber Ecosystem

Become a part of our growing Cyber Security Ecosystem. We’re Bringing everyone together!

Vendors
+
VARs & MSPs
+
Cyber Experts
+
Attendees Registered Annually
+