Are you prepared for a cyber attack? In today's digital age, it's not a matter of if your organisation will be targeted, but when. That's why it's crucial to have a comprehensive plan in place to protect, detect, and recover from a cyber attack.
Imagine this scenario; The worst has happened, your organisation has been hit with a cyber-attack and you are faced with all of the worries, concerns, and dilemmas that come with this.
This session focuses on the recovery aspect of cyber security, where we'll tackle the difficult questions and concerns that arise after an attack. We'll explore the leading technologies and solutions for protection and detection, that are all on display at Cyber Expo Ireland.
Our panel of experts will dive into the crucial topic of cyber security recovery and discover how to develop a plan to minimise the damage caused by an attack.
A cyber-Incident response plan is key but aligning this with the appropriate technologies and organisations to assist you in this is essential to a successful recovery from the “not if but when!”.
So as they say, fail to prepare, prepare to fail!
Paul C Dwyer, President of the International Cyber Threat Task Force (ICTTF) hosted this year’s panel discussion and started this opening address highlighting a well known Irish case study 10 years on - The Loyalty Build hack.
Paul provides a detailed overview of how the attack took place and the sensitive data that was stolen. He also sheds light on the media coverage of the incident and the severe repercussions that Loyalty Build faced, such as the ban on processing data by the data commissioner and the enormous financial losses incurred. Moreover, Paul discusses the devastating long-term impact on Loyalty Build, ultimately leading to their inability to recover from the hack.
Using this scenario the panelists discuss what their individual role would be in the aftermath, impact and recovery stages of an attack like this, including the challenges and issues that arise along the way and require thoughtful consideration. This on-demand session will give you the opportunity to gain valuable insights as the panelists share their real-world experiences.
- 10 years on from the Loyalty Build hack – what have we learned?
Moderator: Paul C Dwyer, Cyber Security Expert
Paul C Dwyer is recognised as one of the world’s foremost experts on cyber security, risk and privacy. As CEO of Cyber Risk International he specialises in corporate and enterprise security, development of cyber defence programs, and business operations protection for CRI clients.
With responsibility for the protection of trillions of euros in global money movement and critical infrastructure technologies that protect hundreds of thousands of companies’ and governments’ interests in more than 100 countries.
Forensics Response: Dr Vivienne Mee, Founder, VM Group
Vivienne is a highly respected professional with over a decade of experience in the field of IT Forensics and Electronic Discovery. Her expertise has made her a recognized leader in delivering world-class services to a wide range of clients, including top pharmaceutical companies, large financial institutions, and government departments.
As an expert in electronic discovery and computer forensic investigations, Vivienne has played a key role in many high-profile cases. She possesses in-depth knowledge of evidence processing, analysis, handling, chain of custody, and documentation. Her proficiency in all areas of the Electronic Discovery Reference Model process and co-authorship of the Electronic discovery Good Practice Guide in Ireland has solidified her reputation as an authority in her field.
Moreover, Vivienne has provided critical advice on current investigations that have led to developments in Irish case law. Her vast experience and deep knowledge make her an invaluable addition to the panel.
Media Response: Technology and Innovation Editor, Business Post
Charlie is a tech and innovation reporter with a background in business journalism at The Irish Times. With a focus on Ireland's tech landscape, Charlie brings a unique perspective to the panel, offering insights into how the media approaches reporting on organizations that have experienced cyber incidents.
Charlie's experience in reporting on businesses and technology makes them a valuable contributor to the discussion. They will share their expertise on how organizations can best navigate the aftermath of a cyber incident and mitigate the impact on their reputation. Charlie will also provide insights into how media coverage can influence public perception and discuss best practices for organisations to communicate effectively during a crisis.
Technology Response: Paul Hearns, Business Owner, PJH Consulting
Paul Hearns is a seasoned technology content strategist, facilitator, and commentator with a wealth of experience in the industry. As the current provider of content strategy and services to the technology industry with PJH Consulting, Paul brings a unique perspective to the panel. Previously, he served as Head of Content for Mediateam where he oversaw the Tech Network portfolio, which included the popular TechFire and TechLive event series. With a background in web development and network management, Paul began his career in the aerospace industry before transitioning to freelance journalism in 1998. In 2005, he became the editor of ComputerScope, which later became TechPro magazine, further honing his expertise in technology and content creation.
We work with our partners to deliver solutions and services to make your clients and customers IT environments more secure and compliant and future proof these solutions by tailoring these to suit their needs and requirements. Renaissance and our suite of security vendors and partners are ideally placed to work with industrial organisations to help analyse current security systems, design a way to improve them, and deliver the improvements over time. Starting with the most critical systems and vulnerabilities. Learn more.
The ICTTF – International Cyber Threat Task Force was established in 2010, as a not for profit initiative promoting the ecosystem of an International independent non-partisan cyber security community. Strength comes from knowledge, so we have developed the Cyber Risk Academy as an online training campus for individuals and organizations to become cyber strong and unified. Strength comes from knowledge, so we have developed the Cyber Risk Academy as an online training campus for individuals and organizations to become cyber strong and unified. We work with our cadre of global cyber security, risk and privacy experts to develop the world’s best cyber community. As we continue to evolve and meet the dynamic challenges, we innovate to make a difference. Learn more.