CISO Ireland Summit | July 12, 2022 | Dublin, Ireland

agenda

Registration & Networking Breakfast

8:30 AM - 9:00 AM

Welcome Address

9:00 AM - 9:10 AM

Opening Keynote | Fuelling For The Future With IT

9:15 AM - 9:45 AM

Fuelling for the future with IT – Supporting business growth and industry evolvement through IT

 

Situation: The changing evolvement of the retail forecourt industry and rapidly evolving customer journeys means that traditional fuel forecourt businesses like Maxol are required to develop their business planning and investment strategies to move away from a dependency on traditional liquid fuels into more convenient retail focus and to venture beyond their traditional capabilities to get ahead of the many different players positioning themselves for success in this rapidly evolving industry.

 

Complication: As a 110-year-old 4th generation family company competing in a very competitive Irish market of multinational global brands with significantly larger turnover and investment the challenge is ensuring the company can keep pace in the Market place and leveraging opportunities through IT transformation across the business.  The unique insights provided by the CIO is assessing the current IT landscape and leveraging and planning IT transformation across all core business functions. Bringing data and information to the forefront of our business, enabling IT services for more efficient process and generation of revenue while ensuring the business stays protected and secure. Ensuring the IT strategy aligns with the evolving business strategy and providing key insights for first in market opportunities to give competitive marketplace advantage. 

 

 

 

 

Declan Costello

Chief Information Officer

Maxol Group

Case Study In Service Desk Automation

9:50 AM - 10:35 AM

This session will show how Marken a leader in Clinical Trial logistics transitioned from a largely manual service desk to automating the majority of common IT service desk requests. You will hear first hand about the experience in transitioning tasks to automated processes and hear first-hand about the business benefits, effort involved, pitfalls and lessons learnt. After this session you will be better positioned to understand the benefits that ITSM automation can bring to your organisation.

Tony Clarke

VP of Information Security & IT

Marken

Thought Leadership | Welcome To The Era Of Flexibility: Why Agility Is The Key To Getting Ahead

9:50 AM - 10:15 AM

There is no doubt that the workplace has undergone an unprecedented transformation in the last few years. As IT leaders prepare for what's next, it's key that they are strategic in determining which technology best supports their workforce and keeps them secure and productive. Hear from the Chrome Enterprise team on workplace trends, how to keep your competitive edge and how leaning into solutions that provide flexibility and agility will future proof your business.

Break

10:20 AM - 10:30 AM

Think Tank | A case study in Service Desk Automation

10:35 AM - 11:00 AM

Tony Clarke

VP of Information Security & IT

Marken

Have You Been Breached Yet?

11:05 AM - 11:30 AM

Preventing and Protecting Your Organisation against 2022's Inevitable Cyber Security Breach

Fallen victim to a data breach yet? If not, your organisation is one of the lucky ones - for now. Cyber attackers are using ever more sophisticated attempts to execute cyber-attacks on a daily basis. Realistically, it's unlikely that an organisation can swerve an attack without robust cyber security measures already in-place to prevent, detect and mitigate cyber threats.

 

Hear from Akamai's EMEA Director of Security Technology and Strategy Richard Meeus and:

 

  • From DDoS & Zero Day vulnerabilities to Account-Takeover - understand the common attacks in the cyber threat landscape.
  • Discover cyber security models and strategies to protect your organisation should it fall victim to an attack.
  • Learn how you can provide your users with risk-free access to applications and services.

Richard Meeus

Security Technology and Strategy Director

Akamai Technologies

Think Tank: Beyond the numbers… Where Real Security Risk Lies

11:35 AM - 12:00 PM

The security industry is now a $160B+ industry. So how are we doing? Many CISOs are feeling the pressure of selecting just the right products from a field of thousands of vendors and even more providers. But where does the real risk lie? In what you have detected or what you haven't? Once a company has put millions of dollars into improving cyber security but are still getting compromised, then what? One CISO's perspective on how to look at the overarching issues we face in trying to detect and stop cyber attacks before they start.

Eoin Fleming

Chief Information Officer CIO

Carne Group

Executive Boardroom | Telehealth 2.0 - Serving the underserved, but at what cost?

12:05 PM - 12:30 PM

Telehealth services are offered by a wide array of doctors, health systems and medical specialties. A senior citizen recovering in post-acute care, for example, can receive an on-camera consultation without the physical and financial toll of travel. The benefits will become more and more evident as more insurers move to cover telehealth consultations.  Such exchanges will increasingly go beyond a patient’s typical providers to encompass a wide range of care needs. This will be pivotal for people in outlying or underserved areas who require the care of a specialist.

Executive Boardroom | A myriad of Apps… but just as many threats

12:05 PM - 12:30 PM

A myriad of Apps… but just as many threats - how to secure code at the enterprise level.

Examining the ever-growing application threat landscape. This increase of threats has put a stress and strain on already thinned tech departments. With that in mind, what are some tips and tricks to stay ahead of the bad actors while securing your enterprise at scale?

Think Tank | Post-COVID Cybersecurity Attacks

12:35 PM - 1:00 PM

Cybersecurity technologies to identify, protect, detect, respond and recover are extremely important, but not sufficient. HumanOS upgrade is required to safely use the Internet and It is not only about training and awareness. It is about the way users must behave online and IT community must openly acknowledge system vulnerabilities. Humans are the weakest and strongest links in Cybersecurity.

James Louttit

Chief Information Officer

CPL

Networking Lunch

1:00 PM - 2:00 PM

Fireside-Chat: Challenges and Lessons Learnt from Shifting Security Left

1:25 PM - 2:20 PM

Eoin Fleming

Chief Information Officer CIO

Carne Group

Think Tank | Pushing Cyber Resilience in 2022

2:05 PM - 2:30 PM

Understanding Cyberattack Risk in Your Organization: Time to Re-evaluate the Fundamentals?

  • How can organizations ensure that budget spent on security solutions are in fact reducing the company's overall risk profile?
  • Has your company made any structural changes to the organization to ensure that IT leaders who manage identity and access control are contributing to discussions with executives about managing the risk of cyberattacks?
  • Given that many cyberattacks start by exploiting vulnerabilities in IT systems, how has your company pivoted to ensure that foundational security practices are closing some of the most common gaps?

Stuart Halford

Chief Information Officer

Building a Strong Information Security Culture through Engagement & Awareness

2:20 PM - 2:45 PM

There are over 20 million developers working for Enterprise organizations across the globe. The universal desire for faster innovation and Digital Transformation has led to DevOps empowered developers demanding efficient reuse of code, which in turn has led to a growing dependence on open source and third-party software libraries. This velocity means applications are developed faster but it also introduces new security risks. 

Join us as we discuss how the modern software supply chain and the drive for digital innovation is putting organizations at risk. And whether it is time to empower every developer to be a DevSecOps expert?

Martina Costelloe

SVP Information Security

SMBC Aviation Capital

Think Tank | Why Organizational Resilience Depends On An Integrated Security Architecture

3:05 PM - 3:30 PM

Why Organizational Resilience Depends On An Integrated Security Architecture To Reduce Risk

The risk extends beyond the perimeter and requires extending your protections against external, insider, and 3rd party threats. It's not just your perimeter that is at risk, it's your customers, your supply chain, your staff, and your business reputation that could be easily tarnished with just one breach.

Executive Boardroom | From Technologist to Foundation - Changing the narrative

3:35 PM - 4:00 PM

 It's not about “the technology” anymore! Today the voice of the CIO/CISO and the perception of IT has been propelled forward from “apps, databases and servers” to the lifeblood of the organization’s ability to exist and execute its mission. How we communicate with our peers, board members and our teams must evolve from the IT speak to advocating and propelling the business vision.

Fireside-Chat: Overcoming the Challenges of Legacy Infrastructures

3:40 PM - 4:05 PM

For Zero Trust initiatives to succeed, they must be accompanied by an eyes-wide-open rollout that recognizes the cultural impact on the organization, and ways to lead, educate and nurture the adoption process. 

Louise Mckeever

Chief Information Officer

Department Of Agriculture Food & The Marine

PM Break

3:50 PM - 4:00 PM

Agile Project Management: What Can I Do as A CIO To Help My Team Succeed?

4:20 PM - 4:45 PM

If data remains as a high valued commodity, ensuring data privacy and securing personal data will continue to be at the top of the list of an organization's concerns. The increases in privacy legislation, such as GDPR and CCPA, and the understanding of the ramifications stemming from a breach have allowed these concerns to remain heavily in the spotlight. Web application flaws have been identified as the top cause of data breaches. As such, establishing and maintaining web application security has developed into a high priority for all organizations. 

James Louttit

Chief Information Officer

CPL

Closing Panel| Time for a change! A Practical Approach to Cultivating a Security Culture

4:50 PM - 5:30 PM
The manifestation of threats is not necessarily a given. Yet, protecting against threats always comes with a price. So, how do we cultivate a security culture when we cannot argue a guaranteed return of everyone’s investment?

Closing Remarks

5:35 PM - 5:45 PM

Summit Happy Hour

5:45 PM - 7:00 PM