Redefining security for the digital age
In a world beset by geopolitical tension, economic uncertainty and near-constant technology change, the role of the CISO has never been more critical. As our world becomes ever more connected, responding to an increasingly diverse range of threats becomes the foundation for everything we do in the digital age. Whether it’s harnessing (and defending against) AI, bridging the global cyber skills shortage, or navigating organisational and technological complexity, the CISO is fast becoming one of the most important voices in the strategic leadership team. Are you ready for what comes next?
Immerse yourself in thought-provoking insights
Exclusively curated from our previous
Security Physical Summit
Agenda
1:10 pm - 1:35 pm
Keynote
Bridging the Gap Between CISOs and the Board
As a CISO you are in The Hotseat.
You’re on the hook to deliver ‘security’ regardless of the budget you’re given.
In addition the inability of today’s frameworks and assessments to effectively ‘speak to the board’ plays out negatively in myriad ways across our industry: short average role tenure, high stress levels, even legal repercussions in some cases. In today’s stagnant job market the impact on personal wellbeing is even more pronounced, a recent study suggests at least 24% of CISOs want to leave their roles; but there’s nowhere to go.
The root cause of these problems is the gap that exists between the CISO and Board. Too often the CISO is there just to take the blame.
The solution is not more tech, more compliance, more risk; we need to fundamentally change the way we structure our communication with the board to set clear expectations on what they get for their money.
Lee will walk through his approach to this problem – with his unique industry perspective having been a multiple time CISO for major brands, and a prior consultancy and sales background with big vendor, big four and MSSPs. He will discuss historical, and current, industry inconsistencies and lead a brief case study from his time as CISO at Domino’s UK&I on how he approached solving the most pressing issue concerning all CISOs today.
1:40 pm - 2:20 pm
Panel
Optimising Security Investments for Maximum Impact: Balancing Innovation, AI, and Security
In today’s evolving digital landscape, organisations are increasingly challenged to innovate while maintaining a secure environment. Expanding attack surfaces, combined with the push for technological advancement—particularly in artificial intelligence (AI)—require leaders to carefully balance fostering innovation with safeguarding their assets. As AI-driven technologies present both opportunities and new risks, security teams must ensure that investments not only protect the organisation but also enable sustainable growth and innovation. How can leaders navigate the trade-offs between AI-driven innovation and cybersecurity while optimising investments to drive business value?
Join this session to explore:
- Approaches to maximise ROI from existing security investments
- Strategies for security leaders to balance AI innovation with cybersecurity without compromising protection
- Best practices for integrating AI solutions to enhance security operations while managing associated risks
- Effective leadership and communication when discussing budget constraints with senior leadership
- Methods to scale, grow, and innovate while maintaining a resilient security posture
2:20 pm - 2:45 pm
Keynote
Re-Centring Your SOC Target Using Zero Trust
With the evolution of cyber threats, a strong security framework is essential. This session explores transforming Security Operations Centers (SOCs) by implementing Zero Trust principles. We will address the strategic and leadership aspects of this transition, ensuring security leaders gain insights and strategies to enhance their security posture and operational efficiency.
Join this session to discuss:
- Unpack the SOC squares, tactical- strategic, reactive- proactive
- How visibility changes under Zero Trust
- How to leverage high fidelity alert data
3:00 pm - 4:00 pm
Roundtables
Track 1: Navigating the New Wave of Global Regulatory Compliance - Strategies for Security Leaders
Regulatory bodies are placing greater emphasis on cyber defence, with the EU having many key regulations coming into force, demanding a shift in how security operates alongside other international regulations. This shift highlights the urgent need for CISOs to manage the growing array of regulations across different markets. Join us for an in-depth roundtable discussion where we will explore the critical aspects and implications of new regulations, providing crucial insights and strategies for how leaders can stay on top of the ever-growing increasing levels of regulation.
Join this roundtable to discuss:
- Strategies for CISOs to comply with diverse regulations across a regional footprint
- Best practices for compliance, including the latest risk assessment methodologies and security controls
- Discussing key new regulations such as the NIS2 Directive, DORA
Track 2: Safeguarding the Bottom Line: Aligning Cloud Security with Business Value
As cloud adoption grows, aligning cloud security with business goals has become a critical priority for organizations striving to secure their digital infrastructure and strengthen business resilience. Cloud security is now as fundamental to the bottom line as traditional risk management, demanding that leaders balance security investments with measurable business outcomes. Join this roundtable to explore practical strategies for integrating cloud security into your business model, delivering protection that drives both operational efficiency and growth.
Join this roundtable to discuss:
- Strategies to align cloud security efforts with overall business objectives
- Best practices for managing cloud security risks and minimizing impacts on operations
- Key metrics to measure the ROI of cloud security initiatives
Track 3: Securing the Future: The critical role of Privileged Access Management in Digital Transformation
This round table will delve into the critical role of Privileged Access Management (PAM) in supporting digital transformation and corporate agility. Participants will examine the current challenges and opportunities within the digital landscape, discussing how PAM can enable innovative business models and enhance organizational responsiveness. Attendees will also explore future trends, preparing to securely adapt for an ever-evolving business environment. This engaging dialogue aims to empower executives to leverage technology as a catalyst for sustainable growth and security.
This roundtable discussion will delve into the essential role of Privileged Access Management (PAM) in advancing digital transformation and supporting corporate agility.
Key topics include:
- Current Challenges and Opportunities: Examining today’s digital landscape
- Enabling Innovation with PAM: How PAM supports new business models and responsiveness
- Future Trends in PAM: Upcoming trends for secure adaptation in evolving environments
- Empowering Executives for Growth: Leveraging PAM for security and sustainable growth
4:10 pm - 4:40 pm
Learning Lab
Can You Believe It?
In this interactive workshop, participants dive into the world of misinformation, examining a mix of real and fake news stories and casting their votes to identify the true one. With nearly 60% of online news found to be partly or fully false, this session sharpens critical thinking skills to spot fake news and navigate today's media landscape with confidence.
4:45 pm - 5:15 pm
Workshop
Boosting Efficiency, Security and Trust at the Irish Cancer Society
In this open conversation, we will explore how the Irish Cancer Society improved operational efficiency, security and simplified processes for their non-technical staff. By prioritising user-friendly solutions, the organisation empowered key employees, such as nurses, to better serve the community. This session will examine the strategic decisions made, insights gained from leadership, and the positive impact these changes have had on the organisation's mission.
Join this session to discuss:
- Leadership Strategies: Examine how non-technical staff addressed operational challenges and focused on their mission
- Efficiency Improvements: Learn how simplifying technology improved efficiency
- Building Trust and Empowerment: Learn how changes fostered trust, empowered staff, and led the Irish Cancer Society on a transformational journey to zero trust
7:20 pm - 9:30 pm
Gala Dinner
8:30 pm - 9:00 pm
Dinner Keynote
Who Are You Calling the Weakest Link? Unveiling the Compassionate Side of Cybersecurity
Why do people fall for cyber scams? Why are we so easily conned? Through a blend of anthropology, psychology, and a touch of comedy, we’ll delve into the reasons behind our vulnerabilities and how our ancestors’ traits have shaped our current behaviours. This session will challenge the traditional fear-based approach to cybersecurity, advocating instead for compassion, empathy, and humour as more effective tools for fostering a security-conscious culture. Join us on a journey that connects the dots between human nature and cybersecurity and discover how embracing our quirks can lead to better security outcomes.
Key Takeaways:
- Human Vulnerabilities: How our evolutionary traits make us targets for cyber threats
- Compassion Over Fear: Why empathy is more effective than punishment in cybersecurity
- Power of Humour: Using humour to engage and educate on security practices
8:15 am - 9:00 am
Panel
Strategies for Building Business Resilience: A Guide to Continuity Planning
In today’s landscape, the question for most organisations isn’t if cyberattacks will target them, but when and how. With the increasing accessibility of sophisticated attack methods to a wider range of adversaries and the inherent risks associated with cloud services, AI and third-party software, achieving complete risk elimination is unrealistic. This session will explore how security leaders and their teams can effectively maintain business operations in an environment where cyber threats are a given.
Key topics include:
- Proactive Risk Management: understand risk tolerance and identify and mitigate threats early
- Enhance cyber resilience to ensure business continuity: Identify your minimum operational level
- Organisational strategies for fostering a culture of operational resilience
9:20 am - 10:20 am
Roundtables
Track 1: Navigating the New Wave of Global Regulatory Compliance - Strategies for Security Leaders
Regulatory bodies are placing greater emphasis on cyber defence, with the EU having many key regulations coming into force, demanding a shift in how security operates alongside other international regulations. This shift highlights the urgent need for CISOs to manage the growing array of regulations across different markets. Join us for an in-depth roundtable discussion where we will explore the critical aspects and implications of new regulations, providing crucial insights and strategies for how leaders can stay on top of the ever-growing increasing levels of regulation.
Join this roundtable to discuss:
- Strategies for CISOs to comply with diverse regulations across a regional footprint
- Best practices for compliance, including the latest risk assessment methodologies and security controls
- Discussing key new regulations such as the NIS2 Directive, DORA
Track 2: Safeguarding the Bottom Line: Aligning Cloud Security with Business Value
As cloud adoption grows, aligning cloud security with business goals has become a critical priority for organizations striving to secure their digital infrastructure and strengthen business resilience. Cloud security is now as fundamental to the bottom line as traditional risk management, demanding that leaders balance security investments with measurable business outcomes. Join this roundtable to explore practical strategies for integrating cloud security into your business model, delivering protection that drives both operational efficiency and growth.
Join this roundtable to discuss:
- Strategies to align cloud security efforts with overall business objectives
- Best practices for managing cloud security risks and minimizing impacts on operations
- Key metrics to measure the ROI of cloud security initiatives
Track 3: Securing the Future: The critical role of Privileged Access Management in Digital Transformation
This round table will delve into the critical role of Privileged Access Management (PAM) in supporting digital transformation and corporate agility. Participants will examine the current challenges and opportunities within the digital landscape, discussing how PAM can enable innovative business models and enhance organizational responsiveness. Attendees will also explore future trends, preparing to securely adapt for an ever-evolving business environment. This engaging dialogue aims to empower executives to leverage technology as a catalyst for sustainable growth and security.
This roundtable discussion will delve into the essential role of Privileged Access Management (PAM) in advancing digital transformation and supporting corporate agility.
Key topics include:
- Current Challenges and Opportunities: Examining today’s digital landscape
- Enabling Innovation with PAM: How PAM supports new business models and responsiveness
- Future Trends in PAM: Upcoming trends for secure adaptation in evolving environments
- Empowering Executives for Growth: Leveraging PAM for security and sustainable growth
10:30 am - 11:00 am
Future Focus Speakers
Overcoming the Pressures and Building a Supportive Leadership Community
The role of a CISO and senior security leaders embodies immense pressure and responsibility, often feeling like a single point of failure. It requires strength and resilience to navigate these challenges. Despite these demands, CISOs and their teams rise to the occasion, knowing their leadership is crucial to safeguarding their organisation’s future. This session will explore how security leaders can manage these challenges by fostering a culture of shared responsibility and personal development. Join us for a candid discussion where senior security leaders can share their experiences and strategies for managing the stresses of their roles. This session aims to create a supportive space for sharing personal journeys and empowering each other in leadership.
11:05 am - 11:35 am
Workshop
AI vs Human Hackers - The Evolution of Cyber Attacks
AI is revolutionising cyberattacks, enabling cybercriminals and nation-states to carry out more sophisticated and targeted operations. Large-scale data breaches provide AI with vast amounts of personal information, making attacks more personalised and harder to detect. The rise of AI-driven phishing and deepfake technology will significantly escalate cyber threats, necessitating proactive defence strategies.
Key Takeaways:
- AI-driven attacks are becoming more advanced and targeted
- Phishing scams will be increasingly difficult to detect due to AI-generated messages
- Deepfake technology will enable real-time impersonations of individuals
- Organisations must train employees, reduce reliance on email, and adopt secure communication platforms
- Vigilance and proactive defence are crucial for staying ahead of evolving threats
12:35 pm - 1:00 pm
Closing Keynote
Securing The Digital Frontiers With Artificial Intelligence
This presentation explores the intersection of AI and Cyber Security, highlighting how Humans and Technology have evolved in the past millions of years, and checking how AI is transforming the traditional Security measures.
Among the key topics include:
- The History of AI and the growing Cyber Security Challenge
- Some examples of how humans have already envisioned different potential future scenarios
- Ethical and practical considerations
- The immediate future of AI in Cyber Security
2:15 pm - 2:30 pm
Beyond the Challenges
Fairmont Carton House - Dublin, Ireland
Situated in Maynooth, 24 km from Phoenix Park, Carton House A Fairmont Managed hotel features accommodation with free bikes, free private parking, a fitness centre and a garden.
Why attend?
Connect with like-minded senior leaders for a curated agenda, focused on tackling your current business critical challenges and driving industry forward.
Be a part of exclusive shared learning, horizon scanning and actionable insights enabling organizations to deliver transformative strategies.
Build meaningful relationships with solution providers matched to your business priorities to help accelerate your projects and deliver your objectives.