teiss logo
Browse the teissDublin2020 agenda and speakers below.

08:00 Registration and welcome refreshments

Threats and opportunities – the current cyber security landscape across Ireland

Plenary keynote

  • Growth in cyber crime; increase in financial and reputational risk; lack of skilled workforce; professional burnout
  • A dynamic sector; growing knowledge base and potential to create a centre for excellence; attracting key talent to the area
  • How can local legislation lead the way in transforming Ireland into a global cyber hub?

by Tiernan Connolly, Head of IT Operations, MUFG Investor Services Show Profile

09:10

Gaining buy-in at the highest level: Communicating cyber risk and developing your Board’s role in cyber security

Plenary keynote

  • How to appeal to basic instincts of fear and greed when covering reputational and fiscal risk
  • Balancing budgets to assess how to mitigate risk, and selling that to your Board
  • Conveying the importance of creating resilience through awareness-raising and training – including the Board members’ own cyber hygiene

by Jared Carstensen, CISO, CRH Show Profile

09:30

Future of our communities and our societies: What is likely to occur and what do we need to do to ensure public safety and maintain security

Plenary keynote

by Dr Mary Aiken, Cyberpsychologist Show Profile

09:50

Minding the skills gap – alternative approaches to attracting and retaining talent

Plenary panel discussion

  • How businesses have an unsustainable basic technical cyber security gap
  • Can we be smarter about cyber security recruitment by looking at the core skills needed?
  • Neurodiversity: a look at non-traditional recruitment in the field as a way to attract talent

by Dr Mary Aiken, Cyberpsychologist Show Profile

by Tony Clarke, CISO, ICON Clinical Research Show Profile

by Ian Donnelly, Principal Consultant, Brightwater Show Profile

by Naina Bhattacharya, CISO, Danone Show Profile

10:10

11:00 Morning refreshments & networking

Practical ways to solve the skills shortage by looking at non-traditional recruitment

Roundtable discussion

11:30

Where to focus security spend to have the greatest impact

Roundtable discussion

11:30

How can we measure cyber awareness?

Roundtable discussion

11:30

Physical and cyber security under one umbrella – should we have Chief Security Officers rather than CISOs?

Roundtable discussion

11:30

The importance of working with HR for a strong vetting procedure to help avoid insider threat

Roundtable discussion

11:30

Building a business case – communicating eloquently about the need for robust cyber security

Roundtable discussion

11:30

Changing the business to a culture of support not a culture of blame

Roundtable discussion

11:30

DevSecComs – working with open source developers to integrate security practices within DevOps process. Is it the answer?

Roundtable discussion

11:30

Building powerful response protocols and teams

Roundtable discussion

11:30

Can industry and academia work together and share knowledge to help shape legislation around cyber security?

Roundtable discussion

11:30

Roundtables are repeated at 12:10 – 12:50

12:50 Lunch & networking

Chair’s Opening Remarks

by Jeremy Swinfen Green, Head of Consulting, teiss Show Profile

13:50

The CISOs Legal Briefing: How the ePrivacy Regulation will impact your information security policies

Case study presentation

  • Weaving basic cyber hygiene into the culture of your business
  • Creating a collaborative culture with regards cyber security – teams working together, everyone responsible
  • Merging physical security awareness alongside your cyber risk awareness policies

by Linda NiChualladh, EMEA Head of Privacy (Legal) & Assistant General Counsel, Citibank Show Profile

14:00

Best practice information security education programmes to adopt in your organisation

Case study presentation

  • Why training on specific threats doesn’t work for cyber security.
  • Focusing on suspicion-raising and meeting the ‘what’s in it for me’ angle
  • Improving your communications and delivery skills to make education more impactful

by Maeve OConnor, Director Information Security, Avaya Show Profile

14:20

Stress and burnout: Strategies to identify and avoid Information Security professional burn-out that the role of CISO can inflict

Panel discussion

  • How to recognise burn out in your team and yourself, and ways in which we can reduce the stress of individuals
  • Building a team culture and values, and how your culture influences honesty and openness
  • Personal strategies to enable InfoSec leaders to “switch off” from work, even during a crisis

by Carmel Somers, Organisational Psychologist Show Profile

by Bernard Swierczyna, Executive Director, First Ireland Risk Management Show Profile

by Greg van der Gaast, Head of Information Security, University of Salford Show Profile

14:40

Emerging and developing threats in cyber crime in 2020/21 and beyond

Case study presentation

  • Which global threat trends are filtering down to the smaller criminals?
  • Trends in data security, ransomware, DDoS attacks, and blockchain marketplaces
  • Managing the nuances of a threat management discipline in a risk management culture

by Jacky Fox, Managing Director | Security Lead, Accenture Ireland Show Profile

14:00

Cyber AI response in an era of Machine-Speed attacks

Case study presentation

  • The digital battleground has shifted from nation-states to corporations. With attacks causing damage in seconds, it’s critical that security technology can fight back.
  • It’s not enough to merely automate encoded human knowledge from a predefined playbook – as threats become smarter and stealthier, our defences must be equally intelligent.
  • Across cloud, network, IoT devices, and email, autonomous response takes precise action, thwarting threats without causing business disruption

by Darktrace

14:20

Using Artificial Intelligence to identify malicious activity within your network

Panel discussion

  • What is the threat from smart malware and botnets?
  • Where is the intersection between AI, cyber security, and human-computer Interaction?
  • How do we ensure security, privacy and transparency in complex and automated systems?

by Paul Collins, Regional Information Security Officer, Elavon Show Profile

by Naina Bhattacharya, CISO, Danone Show Profile

14:40

15:20 Afternoon refreshments & networking

Communicating strategically to achieve security goals

Case study presentation

  • Seizing strategic communication opportunities.
  • Communicating through action to establish your brand.
  • The unexpected power of downward communication.

by Greg van der Gaast, Head of Information Security, University of Salford Show Profile

16:00

Aligning company security with home-life security: How to ensure that colleagues are practicing good cyber hygiene at home

Case study presentation

  • Emphasising the risks that work devices used in the home carry into your organisation
  • How to instil the idea that everybody needs to take ownership of security, both at work and at home
  • Is recognition of responsibly-acting colleagues an effective approach?

by Steve Shawyer, Vice President - Technical Services, IT & CISO, Vitalograph Show Profile

16:20

CISOs working with HR – collaboration to improve your organisation’s cyber resilience

Panel discussion

  • What are the problems that arise when Information Security and HR work independently?
  • Defining HR’s importance with regards cyber security: vetting, employee access, discipline, reward systems, input into education programmes
  • Thinking differently – pushing for a representative from HR as a dedicated security liaison to work together with tech

by Adnan Ahmed, Head of ICT and CISO, Ornua Show Profile

by Carmel Somers, Organisational Psychologist Show Profile

by Glen Hymers, Global CISO & Head of Data Protection, Save the Children International Show Profile

16:40

The increased financial sector acumen of cyber criminals and what this means managing your cyber risk

Case study presentation

  • Sophisticated attacks involving market manipulation, accessing sensitive IPO information, hacking large law firms for M&A information are now commonplace.
  • The cyber crime market is expected to reach a global value of nearly $26.5 trillion by 2022
  • What does this mean for you risk management, threat levels and incident response planning

by Mary Kirwan, Financial crime and cyber security specialist Show Profile

16:00

Establishing effective control and oversight of 3rd parties to secure your information supply chain

Case study presentation

  • Which compliance questions reveal the biggest security risks with 3rd parties?
  • Alternative approaches to identifying risk in the supply chain
  • Identifying risks in your physical supply chain that impact your information supply chain
16:20

What are the barriers to improving cyber resilience in organisations and business, and how to overcome them?

Panel discussion

  • Focus on improving the security controls that would be most effective in light of your specific needs and resources.
  • Can a well-designed incident response plan make it easier to launch a rapid and coordinated response?
  • Identifying the friction between internal organisational structures and how to shift your organisation’s mindset from SOC to a shared duty

by Theo Lynn, Professor of Digital Business, DCU Business School Show Profile

by Gina Dollard, Head of Security Operations, AIB Show Profile

by Bernard Swierczyna, Executive Director, First Ireland Risk Management Show Profile

by Paul Kelly, CISO, Marjorel Show Profile

16:40

17:20 Drinks reception & networking

back to top
teiss logo

Copyright © Lyonsdown Ltd. 2018. All rights reserved. TEISS® is a registered trademark of Lyonsdown Limited.