
Session 1
The Next Phase of Cloud Security
Embedding Zero Trust from Edge to Identity
Time:14:00 – 15:00
Now In Conjunction With:

Overview:
Cloud environments demand more than patchwork defence – they require security by design. As organisations move into the next phase of cloud adoption, Zero Trust must be embedded throughout the architecture, from the network edge to user identity. This session explores how to implement practical, scalable Zero Trust strategies that secure access, protect data, and align with the way modern infrastructure actually works.

Downstairs RM3 – Session 1
Facilitator


Dragan Petkovic
Director of technology and compliance, EMEA Hub
Dragan is helping customers realise savings by increasing efficiency, transforming business through improved user experience, and achieving compliance.
Dragan joined EMEA Hub from Pyramid Analytics, an AI and ML leader in business analytics. Prior to Pyramid, Dragan had a twenty-five-year security career, working for big tech such as IBM and Oracle. While at Oracle, Dragan held the post of CISO Advisory for cloud security for Europe, the Middle East, and Africa, and was involved in regulatory and compliance affairs, advising clients following some high-profile security breaches.
Panelists


Tristan Bateup
Director of Channel Sales UK & Ireland
Tristan Bateup is a cybersecurity veteran with over 15 years of industry experience, having worked in roles spanning both distribution and vendor sectors. Currently serving as the Channel Director for the UK and Ireland at SonicWall, Tristan is a regular speaker at various industry events across the UK and Ireland. His presentations delve into the intricacies of the ever-evolving cyber threat landscape, offering valuable insights and actionable strategies to navigate and mitigate risks effectively. Tristan is deeply committed to fostering innovation and enabling organisations to strengthen their cyber defenses. His proficiency lies in providing organisations with cutting-edge technologies and services to safeguard their assets, personnel, and data.
Presentation on:
Zero Trust Everywhere: Securing Cloud from Edge to Identity
Maintaining the security and reliability of your infrastructure is more critical than ever to protect your users, applications and your business. Threat actors are working overtime to compromise businesses and their reputations through various ways - business email compromise, malware, ransomware, and mobile attacks are just a few common to name. Come join us in this session where we will discuss how you can leverage Zero Trust Network Access in defending your organizations from these growing threat


Jonathan Fussner
Global Head, cyberelements
Experienced technology executive with a strong track record in cybersecurity and emerging technologies. Jonathan has led cross-functional teams across product, sales, marketing, and customer success, driving growth in both startups and global enterprises. Known for building high-impact strategies and forging lasting industry relationships, he thrives at the intersection of innovation and execution. Passionate about advancing cybersecurity, Jonathan connects rising security innovators with key decision-makers to tackle today’s most urgent threats.
Presentation on:
Zero Trust Lines of Defences : Mapping NIST Zero Trust Architecture Report
Zero Trust is not just a buzzword, it's a rigorous approach to cyber security where identity has become the ultimate perimeter of security, combining context, continuity and consistency to provide a complete understanding of the identity of the user and their device, to ensure secure and reliable access. Join us in this session to learn how to implement best practices to align with the fundamental principles of Zero Trust architecture set out by NIST and grant strict access to your IT system based on user behaviour and access context.
Cyber Conference Agenda
KeyNote:
AI is transforming the cybersecurity landscape at an unprecedented rate, creating new opportunities for both attackers and defenders. If your organisation isn’t adapting, it risks falling behind. This keynote will unpack how AI is shaping the future of cyber threats—and what you must do now to stay one step ahead.
- Main Conference Room
10:00am- 10:30am
Paul C Dwyer, CEO, Cyber Risk International
AI is a game-changer in cybersecurity, but it’s also a double-edged sword. If attackers are using AI to breach defences, how can defenders stay ahead? This session covers real-world examples of AI in cyberattacks and how organisations can leverage AI responsibly to strengthen their security posture.
- Main Conference Room
10:40am- 11:55am
Stream Lead: Markus Melin, Founder, NROC
Cybersecurity has shifted from a product to a service. This session explores how Managed Security Service Providers (MSSPs) have transformed traditional cybersecurity approaches into scalable, service-driven models. Learn how organisations can take advantage of these services to mitigate risk and manage threats in real-time.
- Bar (upstairs)
10:45am- 11:45am
Stream Lead: David McCullough- Chief Commercial Officer, Xsell
Ransomware attacks have evolved far beyond simple encryption. Today’s attackers use tactics like double extortion, where they both encrypt data and threaten to leak it. If your organisation doesn’t have a solid ransomware response plan, you’re a target. This session covers how ransomware is changing and how to stay one step ahead.
- Downstairs Room 3
10:45am- 11:45am
Stream Lead: To Be Announced
Human error remains one of the biggest causes of cyber breaches. If your staff aren’t following basic cybersecurity practices, your defences are already compromised. This session covers practical, effective ways to improve cyber hygiene across your organisation - without overwhelming your team with technical jargon.
12:15pm -13:15pm
- Main Conference Room
Stream Lead: To Be Announced
A practical guide to identifying and fixing vulnerabilities across your supply chain before attackers exploit them. If your vendors aren’t secure, you aren’t either. This session covers real-world tactics to shore up your supply chain defences.
- Bar (upstairs)
12:00pm -13:00pm
Stream Lead: To Be Announced
Cyber resilience isn’t just about having the right tools - it’s about embedding security into the very fabric of your organisation. Attackers exploit both human error and technical weaknesses, so how do you build defences that cover both? This session goes beyond firewalls and frameworks, focusing on how to develop a culture of security strategy where people and technology work together to withstand, adapt to, and recover from cyber threats. We’ll explore how to upskill teams, foster security-first mindsets, and implement adaptive technologies that keep you ahead of evolving risks. Expect practical insights and actionable steps to make resilience a core part of your organisation’s DNA.
- Downstairs Room 3
12:00pm -13:00pm
Stream Lead: Paul Hearns, Business Owner at PJH Consulting
Many organisations think meeting regulatory compliance standards is enough to keep them secure. It isn’t. If your focus stops at compliance, you’re leaving gaps attackers can exploit. This session explores how to go beyond regulatory requirements and build a security strategy that protects your organisation from real-world threats.
- Main Conference Room
14:00pm - 15:10pm
Stream Lead:Paul C Dwyer, CEO, Cyber Risk International
The future of AV integration in Ireland is rapidly evolving, driven by advancements in technology and the increasing demand for seamless, intelligent systems. From smart meeting rooms and immersive education environments to cutting-edge entertainment systems, the potential for AV technologies to transform how we communicate and collaborate is immense. This session will explore the exciting opportunities and challenges in integrating AV solutions with modern IT infrastructures.
- Bar (upstairs)
14:00pm - 15:00pm
Stream Lead: To Be Announced
Cloud environments demand more than patchwork defence - they require security by design. As organisations move into the next phase of cloud adoption, Zero Trust must be embedded throughout the architecture, from the network edge to user identity. This session explores how to implement practical, scalable Zero Trust strategies that secure access, protect data, and align with the way modern infrastructure actually works.
- Downstairs Room 3
2:00pm -3:00pm
Stream Lead: Paul Edmonson, Commercial Director, InspiritVision and Director and EMEA-Hub
Closing Panel:
Cybersecurity threats are evolving at a faster pace than ever before. If you’re only planning for today’s risks, you’re already behind. This panel discussion will feature industry leaders sharing their predictions for the next decade and offering practical advice on how organisations can build resilience for what’s coming next.
- Main Conference Room
15.30pm - 16:30pm
Charlie Taylor- Technology and Innovation Editor at Business Post
Join Our Cyber Ecosystem
Become a part of our growing Cyber Security Ecosystem. We’re Bringing everyone together!