Agenda Strategic Stream

Strategic Stream - Mahony Hall
“The Strategic Stream is probably best suited to senior executives and those cyber leaders that want to understand how to strategically plan and deal with issues related to cyber.  Board room level topics and discussions with global industry thought leaders.”

Time Table




Cyber Threats in 2019 and Beyond

Cyber threats are evolving. The cyber threat landscape is now comprised of a myriad of cyber threat actors and their objectives are not always what they seem. Hybrid threat groups collaborating on nation state sponsored or supported campaigns is now becoming pedestrian. The financially motivated cyber criminals are now forming syndicates and leveraging expertise, capacity and transforming into global players. As bigger players, they want bigger rewards and you are the target. The threats and the stakes grow higher as the burden of legislation and business competition means every legitimate business needs to innovate in order to maintain and develop market share. Paul C Dwyer will outline the current cyber threat landscape and what is coming down the road in 2019 and beyond.

Embracing Digital Transformation with Cyber Risk

Digital transformation involves using digital technologies to remake a process to become more efficient or effective. The idea is to use technology not just to replicate an existing service in a digital form, but to use technology to transform that service into something significantly better.Digital transformation can involve many different technologies but the hottest topics right now are cloud computing, the Internet of Things, big data, and artificial intelligence. Learn how you embrace a digital transformation program and manage the cyber security, risk and regulatory related issues.

Data Privacy Management as a Competitive Advantage

GDPR is here and we are starting to see big name breaches in the media. Early days in relation to evaluating the response of data protection commissioners across Europe on handling such incidents. Of course, ultimately the courts will decide many of the related issues. How can an organisation get past seeing privacy as an odious overhead. The legitimate approach to data privacy management should see organisations embracing it as a key factor in trust. Trust ultimately being the most valuable part of a brand identity and consequently the value of an enterprise. Learn how to turn data privacy management into a competitive advantage.

Blockchain Revolution in Banking

Many of the top global banks are adopting blockchain and are heavily investing in research and development. It is hoped that Blockchain will optimise and automate all back end operations.
Some major use cases for the banking sector are customer lending, corporate payments, p2p, and cash pooling. The mortgage industry also has a use case for blockchain whereby banks can store valuation data and make issuance of loans much quicker.
What comes first the opportunity or the threat? Of course there are legitimate security concerns.
Some regulators and large banks are saying the revolution is a long way off.
Some say, if the banks keeping buying out their start-up competitors there will never be a revolution.
Learn how blockchain may not only revolutionise an industry but revolutionise cyber security too.

Understanding EU Cyber Legislation and the Brexit Factor

The EU GDPR and the NIS Directive are key pieces of EU legislation. Learn what the motivation is behind them and what the EU means by a secure digital state. Learn how the cyber ecosystem of the EU operates and the role of various agencies such as ENISA and EuroPol. How all of that affects you and your business today and in the future. Now consider Brexit and what all of that means in relation to data flows, storage, security and privacy. Understanding the EU cyber playing field is an imperative in order to operative legally, efficiently and thrive with opportunities it presents.

Developing a Cyber Strategy for The Board

Every enterprise has a business strategy and the board requires a cyber strategy to support the ambitions of the organization. Understanding the inherent cyber risk of the business model and how that relates to the current status of the business is essential. Managing residual risk and in parallel leveraging the technology landscape to support and deliver the business strategy is a key deliverable for a CISO. The cyber strategy needs to be developed, clearly articulated and supported by the board. Learn how to develop an appropriate strategy for your organization.

Industry 4.0 and Managing Cyber Risk

The fourth industrial revolution brings with it a new operational risk for connected, smart manufacturers and digital supply networks: cyber. The interconnected nature of Industry 4.0–driven operations and the pace of digital transformation mean that cyber attacks can have far more extensive effects than ever before, and manufacturers and their supply networks may not be prepared for the risks. For cyber risk to be adequately addressed in the age of Industry 4.0, cybersecurity strategies should be secure, vigilant, and resilient, as well as fully integrated into organisational and information technology strategy from the start.

Lunch Break at Cyber Threat Summit




Cyberwarfare And Critical National Infrastructure

There are blurred lines between attack actors and motivations. The reality is Cybercriminals work alongside nation states in sponsored and/or supported attacks. Many of these attacks are politically motivated and some are even ideologically based. IoT and IIoT (Industrial Internet of Things) means SCADA and Industrial Control Systems attacks are now a reality for those protecting critical national infrastructure. Using a real life example of a military grade attack with the finger prints of cybercriminals we will explore the lessons learned from the attack on the Ukraine National Grid.

Ireland – FinTech Nation – Panel

Our expert panel comprised of members of the Banking & Payments Federation of Ireland and the FinTech & Payments Association of Ireland will discuss the merits of Ireland as a FinTech Nation.


Dealing with the Cyber Skills Gap – Panel

Cyber security breaches are growing and effect all people and all businesses. There is no silver bullet solution for dealing with the challenge, we require a cyber workforce strategy

The global cyber workforce is made up of only 11% women and there is a predicted shortfall of millions of information security workers by 2022. A recent US study revealed that only 3% of security analysts in the US are African American.

In the cyber security industry, diversity is an imperative. We cannot adequately deal with the growing risk of cyber threats without an adequate workforce.

How can we build a strategy for a more diverse, inclusive workforce so that we may address the growing risk of cyber threats.


Ireland – Brexit and EU Cyber Legislation – Panel

There are two cyber certainties in life, cyber threats will increase as so will cyber legislation. Legislation is always going to play catch up on technology but dealing with the reality of legislation is a challenge for today. Brexit in March 2019 will play a significant role in amplifying the requirements of regulations such as GDPR and the NIS Directive on businesses. The economies of Ireland and the UK inextricably linked. Therefore the reality of data flows, storage, security and privacy are a significant challenge. Is there an opportunity within the crisis and what should businesses be doing to address the risks.

Cyber Awards

Every year the ICTTF International Cyber Threat Task Force takes the opportunity of the Cyber Threat Summit event to recognise individuals and organisations that have excelled in their efforts and innovations to deal with cyber threats. A small number of awards will be presented at this interlude.
15:15- 15:45

Which is bigger the opportunity or the threat? – Panel

We have heard about digital transformation, fintech, AI, Big Data and the Internet of Things. Technology that visionaries, innovators and entrepreneurs can leverage to change the world. But, what is the cost? Unbridled access to data means unbridled access to people and a threat to a humans right to privacy. Apps being developed using psychological tricks and techniques to make us and our children addicts. Manipulation of news and opinion to control the mindset of countries and threaten democracy itself. Digital colonialism by a handful of tech companies that fight net neutrality and the concept of a moral and ethical strategy. If the digital genie has left the bottle how do we control it?
15:45 – 16:45

A Conversation with Edward Snowden

Paul C Dwyer on a live video link to Moscow will interview Edward Snowden. Following on from last year’s conversation, the two will pick up on the themes and topics from last year. A year on, looking at how the world has changed and how the threats to security and privacy have evolved.
16:45 – 17:00

Closing Remarks and Prizes

Closing remarks from Rhonda Reihill VP of Operations at the ICTTF International Cyber Threat Task Force and prizes will be awarded to various winners from the CTS 2018 App competitions.