Agenda CTS2018

CTS2018 Agenda

Full Agendas for All Streams Will Be Published Closer to the Event Date.

Doors Open: 07:00

Breakfast For VIP Ticket Holders from: 07:30

First Speaker: 08:30

Event Close: 17:30

Post Event Networking Reception: 18:00 – 20:00
(For VIP Ticket Holders, Speakers and Sponsors)

Day(s)
Hour(s)
Minute(s)
Second(s)

TOPICS & FIELDS


Enterprise Security

We will look at how the innovative CISOs meet the challenge. Learn from world leading “Business Protection Officers”.

Legal & Compliance

Maintaining a cyber security program compliant with all legal and regulatory aspects is an imperative. The NIS Directive, GDPR, PSD II and many more “Compliance Challenges” will be discussed.

Cyber Threats

We will be discussing and showing you the details of all the main cyber threats of 2018 and forecasting what to look out for in 2019 and beyond.

Web Security

Web based vulnerabilities continue to be a main vector of attack. We will discuss best practices, tools and techniques that can be employed to protect your organisation.

Mobile Apps

Mobile Apps bring with them a specific set of security and compliance difficulties. We will discuss leveraging the opportunities that come with embracing these challenges.

Security Operations

Threat intelligence, detection and response. Develop SOC capabilities in-house, outsource as a managed service or hybrid model.

Security Tools

Learn about the latest innovations and tools that can help you with the cyber challenge. Such as Machine learning, AI and Open Source technologies.

IoT

The Internet of Things, especially the Industrial IoT (SCADA) has a unique set of challenges that need to be addressed.

Physical Security

Physical security is the cousin of cyber security. A converged security model is essential to protect an enterprise.

Cyber Insurance

Transferring risk is an option for all business risks. We explore the pros and cons of cyber insurance offerings.

Network Security

Securing the perimeter is a baseline for organisations, learn how to adopt the most appropriate strategy and tools.

Cyber Education

Users are the last line of defence. Learn how to create a cyber security culture with measurable effective tools to support your program.

Cloud Security

Transitioning to the cloud, dealing with security, privacy and GRC issues. Learn from real life case studies and examples.

Dark Web

Understanding the dark web, crypto currencies and the underground market places. How your business may be effected and what you should know.

FinTech and RegTech

Learn how to embrace the most innovative FinTech and RegTech solutions to deal with the cyber challenge.

Cyber Espionage

The world of industrial espionage has embraced cyber tools and techniques. Learn how to protect executives, your staff and your intellectual property from the spies.

KEYNOTE SPEAKERS


Edward Snowden
Edward Snowden
PRESIDENT OF FREEDOM OF THE PRESS FOUNDATION
Edward Snowden
PRESIDENT OF FREEDOM OF THE PRESS FOUNDATION
Edward Joseph Snowden is an American computer professional, former Central Intelligence Agency (CIA) employee, and former contractor for the United States government who copied and
Paul C Dwyer
Paul C Dwyer
President of the ICTTF, CEO of Cyber Risk International
Paul C Dwyer
President of the ICTTF, CEO of Cyber Risk International
Paul C Dwyer is an Internationally recognised information security expert with over two decades experience and serves as President of ICTTF and Co Chairman of
Michelle Dewberry
Michelle Dewberry
Chairperson
Michelle Dewberry
Chairperson
Michelle is a broadcaster and businesswoman who is fast becoming known for her frank, passionate and down-to-earth attitude. A regular TV commentator, Michelle also presents
Lucinda Creighton
Lucinda Creighton
CEO of Vulcan Consulting Ltd.
Lucinda Creighton
CEO of Vulcan Consulting Ltd.
Lucinda Creighton is a former Irish Minister for European Affairs and CEO of Vulcan Consulting Ltd. As a member of the Irish Parliament for nine
Jamie Bartlett
Jamie Bartlett
Author, Broadcaster and Director at Demos
Jamie Bartlett
Author, Broadcaster and Director at Demos
Jamie Bartlett is the Director of the Centre for the Analysis of Social Media at the think-tank Demos, where he specialises in online social movements
Pierluigi Paganini
Pierluigi Paganini
CTO at CSE Cybsec Enterprise and Member ENISA ETL
Pierluigi Paganini
CTO at CSE Cybsec Enterprise and Member ENISA ETL
Pierluigi Paganini is Chief Technology Officer at CSE Cybsec Enterprise, member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder
Prof Theo Lynn
Prof Theo Lynn
Professor at DCU Business School
Prof Theo Lynn
Professor at DCU Business School
Professor Theo Lynn is Professor of Digital Business at DCU Business School and is the Principal Investigator of the Irish Centre for Cloud Computing and
Bob Carver
Bob Carver
Principal Security Analyst at Verizon Wireless
Bob Carver
Principal Security Analyst at Verizon Wireless
Bob Carver CISM, CISSP, M.S. started working in the financial industry in network management, capacity management, BC/DR (Business Continuity/Disaster Recovery) and later started working multiple