You are using an outdated browser. For a faster, safer browsing experience, upgrade for free today.

Some Of The Topics and Debates Discussed Will Include:

Strategic Stream Agenda

Mahony Hall




9.15 - 9.45The Geopolitical Aspects of Cyber Warfare
9.50 - 10.10
David McWilliams

David McWilliams

Economist, broadcaster, and best selling author

Recognised as the most influential economist in the UK and Ireland, David will be one of the keynote speakers as this years CTS2017.
Consistently accurate in his forecasts, David McWilliams was the only economist in Ireland who accurately forecast a strong UK Brexit vote. David will be addressing the audience in The Mahony Hall with his presentation 'The opportunities for Ireland with Brexit'.

The Brexit Opportunity with Cyber
10.15 - 10.35
Jamie Bartlett

Jamie Bartlett

Director of the Centre for the Analysis of Social Media at the think-tank Demos

Jamie Bartlett is the Director of the Centre for the Analysis of Social Media at the think-tank Demos, where he specialises in online social movements and the impact of technology on society. He is also author of the best selling book The Dark Net and a regular commentator on national and international media outlets.


Demos is a think tank based in the United Kingdom with a cross-party political viewpoint. It was founded in 1993 and specialises in social policy, developing evidence-based solutions in a range of areas - from education and skills to health and housing.
Demos also houses the Centre for the Analysis of Social Media, which leads the study of how the rise of the digital world affects politics, policy and decision-making.
The current Chief Executive is Claudia Wood, who joined the think tank in 2009 and previously worked for Tony Blair’s strategy unit.
Demos publishes a quarterly journal, titled Demos Quarterly,[1] which features articles from politicians, academics and Demos researchers.

The Future of the Dark Web
10.40 - 11.00
Steven Wilson

Steven Wilson

Head of European Cybercrime Centre (EC3) EUROPOL

Steven originates from Ayrshire, Scotland. He was a Police Officer in Scotland from 1985-2015. During this time, he served with Strathclyde Police, Scottish Crime and Drug Enforcement Agency, Her Majesty’s Inspectorate of Constabulary and, since 2013, with the reorganisation of policing in Scotland into a national force, Police Scotland.

Steven performed a variety of senior Detective roles and was responsible for the national units in Scotland delivering: witness protection, covert technical policing, fugitives, undercover policing, assisting offender programme and all forms of cybercrime and cyber enabled crime including online child protection.

Steven was the Scottish representative on UK cyber governmental and policing groups and led on industry and academic partnership groups on cyber resilience in Scotland.
Steven has also worked in covert policing, major investigations, sex offender management, Counter Terrorism investigations and represented the UK on International policing matters. Steven commenced as Head of EC3 on 18 January 2016.


Headquartered in The Hague, the Netherlands, we assist the 28 EU Member States in their fight against serious international crime and terrorism. We also work with many non-EU partner states and international organisations.

Large-scale criminal and terrorist networks pose a significant threat to the internal security of the EU. Terrorism, cybercrime and people smuggling, to name just a few, pose a severe threat to the safety and livelihood of its people. The biggest security threats come from:

  • Terrorism;
  • International drug trafficking and money laundering;
  • Organised fraud;
  • The counterfeiting of euros;
  • People smuggling.

But new dangers are also growing, such as online radicalisation and trafficking in human beings. The networks behind the crimes in each of these areas are quick to seize new opportunities, and they are resilient in the face of traditional law enforcement measures.

Europol Tackling Cybercrime
11.05 - 11.25
Bill Liao

Bill Liao

Co-founder of the CoderDojo

Australian entrepreneur, venture capital investor, diplomat, author and speaker with a distinguished record in the areas of business, development and community activism, Bill is co-founder of the CoderDojo movement, a free global network formed to assist young people to learn how to computer program and Founder of Weforest, a global movement dedicated to planting trees and which now has seen  €14.5 million planted around the world.  He is a general partner with SOSV a $3.00 international accelerator venture capital fund and runs a life sciences Accelerator Program, Rebelbio, in Cork, focusing on entrepreneurs building technologies in or around the field of living things.

Previously, Bill co-founded XING, a pioneering business social networking platform in 2003 and served as COO of Davnet a telecommunications carrier that went public in the late 90's.  Bill serves as a special diplomatic envoy for St Kitt’s and Nevis, with an emphasis on sustainable development and the environment.

He is also chair of the investment committee of the Nominet Trust in the UK. Author of three books, he is a regular speaker at many events and venues such as The London School of Economics, The World Economic Forum, The Globe Forum in Sweden, The House of Commons and TED as well as TEDx


CoderDojo is a global volunteer-led community of free programming clubs for young people between 7 and 17. The movement is a grassroots organisation with individual clubs (called 'Dojos') acting independently. A charity called the CoderDojo Foundation operates out of Dublin and supports the various clubs by providing a central website and some other support services. Supporters of CoderDojo believe it is part of the solution to addressing the global shortage of programmers by exposing young people to ICT at a young age. The movement has seen significant growth since its founding. The CoderDojo Foundation estimates 1,250 Dojos spread across 69 countries, with a growth rate of several new Dojos every week.

Inspiring The Future
11.30 - 11.50
Ira Winkler

Ira Winkler

President of Secure Mentem, author of Advanced Persistent Security

Ira is also author of the riveting, entertaining, and educational books, Advanced Persistent Security, Spies Among Us and Zen and the Art of Information Security. He is also a columnist for ComputerWorld, and writes for several other industry publications.

Mr. Winkler has been a keynote speaker at almost every major information security related event, on 6 continetnts, and has keynoted events in many diverse industries. He is frequently ranked among, if not the, top speakers at the events.

Mr. Winkler began his career at the National Security Agency, where he served as an Intelligence and Computer Systems Analyst. He moved onto support other US and overseas government military and intelligence agencies. After leaving government service, he went on to serve as President of the Internet Security Advisors Group, Chief Security Strategist at HP Consulting, and Director of Technology of the National Computer Security Association. He was also on the Graduate and Undergraduate faculties of the Johns Hopkins University and the University of Maryland. Mr. Winkler was recently elected the International President of the Information Systems Security Association, which is a 10,000+ member professional association.

Mr. Winkler has also written the book Corporate Espionage, which has been described as the bible of the Information Security field, and the bestselling Through the Eyes of the Enemy. Both books address the threats that companies face protecting their information. He has also written hundreds of professional and trade articles. He has been featured and frequently appears on TV on every continent. He has also been featured in magazines and newspapers including Forbes, USA Today, Wall Street Journal, San Francisco Chronicle, Washington Post, Planet Internet, and Business 2.0.

Spies Among Us
11.55 - 12.15Can You Transfer Cyber Risk?
12.20 - 12.40
Chuck Georgo

Chuck Georgo

Cyber Strategist at

For more than thirty years, Chuck Georgo has served as a public safety strategist, business analyst, systems engineer, and project manager supporting national and homeland security missions of federal, state, local, and tribal government agencies, and corporate security and intellectual property protection objectives of private sector organizations.

In each engagement, Chuck helped organizations to develop and implement effective strategy, strong program management, innovative technologies, and behavior changing performance management systems designed to effect achievement of desired public safety and business results.

Chuck has completed competencies for ISO/IEC 27001:2005 Lead Auditor (TPECS). He currently serves on the Criminal Justice Information Systems (CJIS) Committee for the International Association of Chiefs of Police (IACP), and Security Committee of the Integrated Justice Information Systems (IJIS) Institute. Past leadership roles included First Vice President and Program Director for the InfraGard Maryland Members Alliance, and Chairman, Security and Privacy Committee of the IJIS Institute.

Chuck holds a Master of Science Degree in Public Administration through Central Michigan University, a second Master of Science Degree in Information Architecture through Capitol College, a Graduate Certificate in eCommerce Management, and an Bachelors of Science Degree in Sociology, awarded through University of the State of New York, Excelsior College.

NOWHERETOHIDE.ORG helps government agencies and private sector organizations to better achieve our their public safety, homeland security, and national security objectives.

Applying Privacy by Design as a Strategy to Reduce Your Attack Surface
12.45 - 13.05
Tony Sales

Tony Sales

We Fight Fraud

Tony Sales is probably the only man in the world to have ever worked at both the summit of organisedcrime and the pinnacle of retail and banking fraud and loss prevention. His cross-over from elite criminal to top level consultant, trusted by the inner sanctum of banking, retail and insurance businesses with their most sensitive information, has been remarkable...

Tony Sales has been labelled Britain’s Greatest Fraudster by the media. Although it is not an acclamation of which he is particularly proud, it does give an indication of the accomplishment and notoriety of the man.
At his prime, Tony was defrauding retailers, finance houses and financial institutions out of £30 million through false identities, credit cards and other fraudulent schemes. Today he is now a reformed character. He works with leading banks retailers and financial institutions to identify weaknesses in their systems and correct them. His transformation from underworld royalty to elite consultant has been staggering and his insights into the worlds of crime and commerce utterly unique.

We Fight Fraud

We Fight Fraud is a new approach to combatting the ever rising epidemic of UK frauds. We bring together leading corporate consultancies in a super tag team fight to the end. It’s Fraudsters, Cyber Crime, Social Engineering, Public outreach and leading consultants wrapped up in the cinematographic works of it’s own film production.

We want people from all walks of life and corners of the UK to join us in this fight against fraud and learn how to prevent the worst taking hold of your hard earned money. Whilst the rest tolerate fraud, we fight fraud.

Now let’s get going. Learn how to fight frauds.

How I Stole £30m
13.10 - 14.10LunchLunch
14.15 - 14.35Panel DiscussionIs Ireland Ready for EU Cyber Legislation?
14.40 - 15.00Panel DiscussionCyber Skills Gap  - What About Women in Cyber Security?
15.05 - 15.25Panel DiscussionIs Cyber Security More Important Than Physical Security?
15.30 - 15.50Panel DiscussionFake News - How Do You Handle The Challenge of Perception is Reality?
15.55 - 16.15Panel DiscussionTodays Economy is Interconnected - How Do We Establish Cyber Trust and Assurance?
16.20 - 16.40Panel DiscussionDo Directors of Irish companies understand their Cyber responsibilities?
16.45 - 17.00Paul C DwyerClosing Speech - Why Bono would make a great CISO!

GDPR – The Game Changer

Understanding the requirements of the new data privacy regulation and developing a strategy.
Breach notification, substantial fines based on global turnover.
New responsibilities for processors and massive potential exposure to litigation.
Understanding your responsibilities, the business impact, how to control the risk within your vendor supply chain and how to ensure you are operating legally from May 2018.

Cyber Insurance – A Viable Option?

Understanding the benefits and aspects of cover.
Cyber attacks, insider threats, the cost of breaches and how to recover.
The various kinds of cyber related policies available and the various actors involved when an attack occurs, how to deal and insure against cyber risks in a holistic way.

Cyber Incident Response

Breaches are inevitable but would you know if you are already breached? Updates in regulatory compliance mandate the implementation of sufficient detective and responsive controls. What does appropriate incident response look like? How do you test? How do you leverage expertise? How do you integrate with existing capabilities including cyber threat intelligence.

Cyber Skills Gap

Thousands of open cyber security roles, how do you develop in house talent and how do you recruit. Understanding the specialist aspects to cyber team building and the related challenges to closing the cyber skills gap.

Cyber Intelligence – Using Machine Learning to Detect

Cyber Intelligence is now an essential part of every security teams arsenal. How do you utilise and develop upon implementing intelligence. Learn how to adopt the latest innovations in machine learning to protect your organisation.

NIS Directive – Are You In or Out of Scope?

Are you an operator of essential services in support of the national digital infrastructure? Mandatory breach notification, fines, reputational damage, intelligence sharing and a boost to the economy are all potential aspects.

Insider Threat – Hack The Human

When the bad guys are unable to defeat your technical defences, their last approach often involves your last line of defence – the human. Your staff are the most valuable and efficient weapon against cyber threat actors. How do you go beyond compliance training and education. How to you invoke loyalty and weaponise your staff to deal with the 24/7 threat they are exposed to from cyber malefactors.

Perception is Reality – Fake News and Using Effective PR as a Weapon

Part of many cyber attacks includes misinformation and distraction techniques. Consequential reputational damage and collateral damage for cyber attacks on a vendor supply chain are PR challenges. How do you leverage the power of effective PR and integrate the capabilities in order to be prepared for and be able to deal with the fall out of a cyber attack.

Physical Security is the Cousin of Cyber

Physical access to a premises, people or equipment is a component of many cyber attacks. Social engineering techniques are often employed as part of various attacks. How to you ensure your investment in physical security is adequate and integrated with your overall cyber security strategy so that their capabilities can be leveraged.

The Art of Cyber Resilience

Business continuity, disaster recovery and IT safeguards are all components of cyber resilience. How do you strategically aligned and measure these efforts within an organisation and leverage existing investment and resources. International standards, regulatory mandated levels of maturity and developing a cyber resilience strategy. Reduce the likelihood of an incident and increase the ability to detect and recover are key principles.

Cyber Threat Is A Board Imperative

What is mandated for Directors in relation to cyber risk and governance. Understanding your requirements in relation to due diligence. Fines, litigation and other exposure related to cyber risk will be outlined and how a board can prepare themselves and their organisation to deal with the legal and compliance aspects.

Are You Developing Securely?

“Bake In – Don’t Bolt On” is often the mantra in relation to the security aspects of the development lifecycle. How do you go about developing secure code that is compliant with regulations in respect to privacy and security. How do you test and gain assurance from third party developers. Strategically dealing with secure application development and understanding the challenges.

Outsourced Serviced Provider Takes Security and Privacy Seriously

Responsibility in relation to security and privacy lies with your organisation when they contract to an OSP Outsourced Service Provider. Increased controls within regulations magnifies the consequences of any failings in this area. What does an OSP that takes your security and privacy look like? What kind if controls and SLA’s are appropriate. With cloud based services what should understand.

It All Starts With Captain CISO

The CISO (Chief Information Security Officer) in an ideal world should report to the CEO and is the ultimate business protection offer. They have responsibility for protecting your organisation in relation to risk, security and privacy. What is the role of a CISO? How should they integrate and align strategically with the business. How can they develop a cyber strategy (CISO Framework) for your organisation which includes and leverages all stakeholders.

Is Your Data on The Dark Web?

Understanding the Dark Web and the risk aspects it brings in relation to cyber. How to protect your organisation and monitor the deepest recesses of the underworld communities.

Security and the Vendor Supply Chain

A chain is only as strong as its weakest link. Recent changes in the cyber related legislation has put a renewed emphasis on the importance of understanding and gaining assurance from all third parties you deal with and reply on. How can you do that? What are the tools and techniques you can utilise in order to evaluate and secure your supply chain.

Strategic Debates

Miriam O'Callaghan will chair several strategic cyber debates in the Mahony Hall to over 1,000 delegates with all the acumen broadcast to over 100 countries around the world. These debates will discuss the hottest topics related to cyber security with expert panellists, showcasing their expertise in each subject matter. Some of the topics include.

  • Fake News The Cyber Security Risks including contributions from Mark Little founder of Storyful.
  • Is Ireland Ready For The EU Cyber Legislation?
  • What Does "Cyber BREXIT" Mean?
  • The Cyber Skills Gap.
  • Evolving Ireland's Cyber Security Ecosystem.
  • The Trump Factor And Cyber – Should We Be Concerned?
  • Cyber Security In The Cloud.
  • The Cyber Safety of Children including contributions from Grainia Long CEO of ISPCC.

Fake News is a Cyber Threat

"Financial markets can expect further criminal examples of attempts to spook the market with false rumours spread through social media. Remember when the Syrian Electronic Army hacked a Twitter feed and reported explosions at the White House that injured US President Obama. Again this is old scams in a new way, criminals could “short” stock trades in anticipation of such rumours. In that case, the Dow lost more than 140 points in 6 minutes, with the S&P 500 alone losing market cap of $136.5 billion. Now imagine what a hacked or unhacked tweet from Donald Trump could do!"

Paul C Dwyer - President of the ICTTF

Is Ireland Ready for EU Cyber Legislation?

New European Cyber legislation includes the Network Information Security (NIS) Directive and the GDPR General Data Protection Regulation. These regulations include mandatory breach notification and potential fines of up to €20m or 4% of Global turnover.

Is Ireland ready?

What does Cyber Brexit Mean?

The GDPR, NIS Directive and all EU cyber related legislation still applies to the UK. What is the reality of BREXIT in relation to Cyber? Law enforcement intelligence exchange, arrest warrants. What about data flows and regulatory concerns over privacy and compliance. The opportunities that exist for Ireland and other today to help organisations deal with these challenges and more will be discussed.

The Trump Factor and The Geopolitics of Cyber Attacks?

Following on from reports of hacks on the recent US elections and in the context that the FBI have referred to Trump as an "unwitting agent" of Putin. We need to explore the geopolitical nature of cyber attacks. We explore the evidence of state sponsored attacks and the “conscious collusion” between organised cyber criminals and nations

The Cyber Safety of Children

Grainia Long CEO of ISPCC and recipient of the ICTTF Cyber Safety Award 2016 will be amongst those involved in the debate on how to protect our children online. Cyber Safety from all aspects relating to all ages of children will be discussed. The objective of the debate to discover what we, the industry and government can do to help with this challenge.