Downstairs RM3 – Session 3

Session 1

The Next Phase of Cloud Security

Embedding Zero Trust from Edge to Identity

Time:14:00 – 15:00

Now In Conjunction With:

Overview:

Cloud environments demand more than patchwork defence – they require security by design. As organisations move into the next phase of cloud adoption, Zero Trust must be embedded throughout the architecture, from the network edge to user identity. This session explores how to implement practical, scalable Zero Trust strategies that secure access, protect data, and align with the way modern infrastructure actually works.

Downstairs RM3 – Session 1

Facilitator

Dragan Petkovic

Director of technology and compliance, EMEA Hub

Dragan is helping customers realise savings by increasing efficiency, transforming business through improved user experience, and achieving compliance.

Dragan joined EMEA Hub from Pyramid Analytics, an AI and ML leader in business analytics. Prior to Pyramid, Dragan had a twenty-five-year security career, working for big tech such as IBM and Oracle. While at Oracle, Dragan held the post of CISO Advisory for cloud security for Europe, the Middle East, and Africa, and was involved in regulatory and compliance affairs, advising clients following some high-profile security breaches.

 

Panelists

Tristan Bateup

Director of Channel Sales UK & Ireland

Tristan Bateup is a cybersecurity veteran with over 15 years of industry experience, having worked in roles spanning both distribution and vendor sectors. Currently serving as the Channel Director for the UK and Ireland at SonicWall, Tristan is a regular speaker at various industry events across the UK and Ireland. His presentations delve into the intricacies of the ever-evolving cyber threat landscape, offering valuable insights and actionable strategies to navigate and mitigate risks effectively. Tristan is deeply committed to fostering innovation and enabling organisations to strengthen their cyber defenses. His proficiency lies in providing organisations with cutting-edge technologies and services to safeguard their assets, personnel, and data.

Presentation on:

Zero Trust Everywhere: Securing Cloud from Edge to Identity

Zero Trust Everywhere: Securing Cloud from Edge to Identity

Maintaining the security and reliability of your infrastructure is more critical than ever to protect your users, applications and your business. Threat actors are working overtime to compromise businesses and their reputations through various ways - business email compromise, malware, ransomware, and mobile attacks are just a few common to name. Come join us in this session where we will discuss how you can leverage Zero Trust Network Access in defending your organizations from these growing threat

Jonathan Fussner

Global Head, cyberelements

Experienced technology executive with a strong track record in cybersecurity and emerging technologies. Jonathan has led cross-functional teams across product, sales, marketing, and customer success, driving growth in both startups and global enterprises. Known for building high-impact strategies and forging lasting industry relationships, he thrives at the intersection of innovation and execution. Passionate about advancing cybersecurity, Jonathan connects rising security innovators with key decision-makers to tackle today’s most urgent threats.

Presentation on:

Zero Trust Lines of Defences : Mapping NIST Zero Trust Architecture Report

Zero Trust Lines of Defences : Mapping NIST Zero Trust Architecture Report

Zero Trust is not just a buzzword, it's a rigorous approach to cyber security where identity has become the ultimate perimeter of security, combining context, continuity and consistency to provide a complete understanding of the identity of the user and their device, to ensure secure and reliable access. Join us in this session to learn how to implement best practices to align with the fundamental principles of Zero Trust architecture set out by NIST and grant strict access to your IT system based on user behaviour and access context.

Cyber Conference Agenda

KeyNote:

The Cyber Arms Race: Winning in a World of AI-Powered Threats

AI is transforming the cybersecurity landscape at an unprecedented rate, creating new opportunities for both attackers and defenders. If your organisation isn’t adapting, it risks falling behind. This keynote will unpack how AI is shaping the future of cyber threats—and what you must do now to stay one step ahead.

10:00am- 10:30am

Paul C Dwyer, CEO, Cyber Risk International

AI in Cybersecurity: Friend, Foe, or Both?

AI is a game-changer in cybersecurity, but it’s also a double-edged sword. If attackers are using AI to breach defences, how can defenders stay ahead? This session covers real-world examples of AI in cyberattacks and how organisations can leverage AI responsibly to strengthen their security posture.

10:40am- 11:55am

Stream Lead: Markus Melin, Founder, NROC

The Evolution and Future of MSSPs

Cybersecurity has shifted from a product to a service. This session explores how Managed Security Service Providers (MSSPs) have transformed traditional cybersecurity approaches into scalable, service-driven models. Learn how organisations can take advantage of these services to mitigate risk and manage threats in real-time.

10:45am- 11:45am

Stream Lead: David McCullough- Chief Commercial Officer, Xsell

Ransomware Reloaded: Navigating the Evolution of Cyber Extortion

Ransomware attacks have evolved far beyond simple encryption. Today’s attackers use tactics like double extortion, where they both encrypt data and threaten to leak it. If your organisation doesn’t have a solid ransomware response plan, you’re a target. This session covers how ransomware is changing and how to stay one step ahead.

10:45am- 11:45am

Stream Lead: To Be Announced

Fixing Human Error: The Weakest Link Is Still the Strongest Threat

Human error remains one of the biggest causes of cyber breaches. If your staff aren’t following basic cybersecurity practices, your defences are already compromised. This session covers practical, effective ways to improve cyber hygiene across your organisation - without overwhelming your team with technical jargon.

12:15pm -13:15pm

Stream Lead: To Be Announced

Supply Chain Security: Your Weakest Link is Their Way In

A practical guide to identifying and fixing vulnerabilities across your supply chain before attackers exploit them. If your vendors aren’t secure, you aren’t either. This session covers real-world tactics to shore up your supply chain defences.

12:00pm -13:00pm

Stream Lead: To Be Announced

Building Cyber Resilience: Empowering People and Technology

Cyber resilience isn’t just about having the right tools - it’s about embedding security into the very fabric of your organisation. Attackers exploit both human error and technical weaknesses, so how do you build defences that cover both? This session goes beyond firewalls and frameworks, focusing on how to develop a culture of security strategy where people and technology work together to withstand, adapt to, and recover from cyber threats. We’ll explore how to upskill teams, foster security-first mindsets, and implement adaptive technologies that keep you ahead of evolving risks. Expect practical insights and actionable steps to make resilience a core part of your organisation’s DNA.

12:00pm -13:00pm​

Stream Lead: Paul Hearns, Business Owner at PJH Consulting

The Compliance Trap: Why Being ‘Secure Enough’ Won’t Cut It in the Era of DORA and NIS2

Many organisations think meeting regulatory compliance standards is enough to keep them secure. It isn’t. If your focus stops at compliance, you’re leaving gaps attackers can exploit. This session explores how to go beyond regulatory requirements and build a security strategy that protects your organisation from real-world threats.

14:00pm  - 15:10pm

Stream Lead:Paul C Dwyer, CEO, Cyber Risk International

The Future of AV Integration in Ireland

The future of AV integration in Ireland is rapidly evolving, driven by advancements in technology and the increasing demand for seamless, intelligent systems. From smart meeting rooms and immersive education environments to cutting-edge entertainment systems, the potential for AV technologies to transform how we communicate and collaborate is immense. This session will explore the exciting opportunities and challenges in integrating AV solutions with modern IT infrastructures.

14:00pm  - 15:00pm

Stream Lead: To Be Announced

The Next Phase of Cloud Security: Embedding Zero Trust from Edge to Identity

Cloud environments demand more than patchwork defence - they require security by design. As organisations move into the next phase of cloud adoption, Zero Trust must be embedded throughout the architecture, from the network edge to user identity. This session explores how to implement practical, scalable Zero Trust strategies that secure access, protect data, and align with the way modern infrastructure actually works.

2:00pm -3:00pm​

Stream Lead: Paul Edmonson, Commercial Director, InspiritVision and Director and EMEA-Hub

Closing Panel:

Threat Horizon 2030: Preparing for the Next Wave of Cyber Risks

Cybersecurity threats are evolving at a faster pace than ever before. If you’re only planning for today’s risks, you’re already behind. This panel discussion will feature industry leaders sharing their predictions for the next decade and offering practical advice on how organisations can build resilience for what’s coming next.

15.30pm - 16:30pm

Charlie Taylor- Technology and Innovation Editor at Business Post

Join Our Cyber Ecosystem

Become a part of our growing Cyber Security Ecosystem. We’re Bringing everyone together!

Vendors
+
VARs & MSPs
+
Cyber Experts
+
Attendees Registered Annually
+