This year, we're embracing new EU regulations that not only protect but also empower businesses and innovators in the digital domain. Join us to connect with industry leaders, policy makers, and tech visionaries, all collaborating to forge a secure, thriving digital future for Europe. Don't miss the opportunity to be at the forefront of cybersecurity and digital economy discourse at the EU Cyber Summit!
2 Day Education Programme with Qualification
The International Cyber Threat Task Force (ICTTF) cordially invites you to the pivotal event of the year – the EU Cyber Summit 2024. With over a decade-long legacy of pioneering the most influential and innovative events in cybersecurity, we are charting a new course in cyber education with our most ambitious format yet.
The Pinnacle of Cyber Education
3 STREAMS
Knowledge Dissemination
The EU Cyber Summit 2024 is structured into three focused streams tailored for different audiences:
STRATEGIC STREAM: Aimed at senior decision-makers, this stream addresses high-level strategies for managing cyber risk, compliance, and innovation within the digital economy.
OPERATIONAL STREAM: Geared towards professionals overseeing day-to-day operations, this stream focuses on practical aspects of cybersecurity management and compliance.
TECHNICAL STREAM: Designed for technical staff, this stream delves into detailed aspects of cybersecurity, offering in-depth discussions on technical challenges and solutions.
Workshops
KEY TOPICS
The agenda will also cover other related areas such as:
- EU
AI (Artificial Intelligence) Act
- Markets
in Crypto-Assets (MiCA) framework
- European
Union Cybersecurity Certification Scheme for Cloud Services (EUCS)
- Anti-Money
Laundering and Countering the Financing of Terrorism Authority (AMLA)
-Electronic
Identification, Authentication and Trust Services (eIDAS)
- Digital Services Act (DSA)
Unlocking DORA: Mastering Digital Operational Resilience for the Future
In the ever-evolving digital landscape, operational resilience is paramount. Our dedicated workshop on the Digital Operational Resilience Act (DORA) provides an essential deep dive into this critical regulation. Led by an industry expert, participants will gain comprehensive insights into the essence of DORA—what it is, its significance in the current digital ecosystem, and the broad implications it carries for various stakeholders.
This session will unravel why DORA is not just a regulatory framework but a necessary foundation for ensuring that the financial sector can withstand, respond to, and recover from technology-related disruptions. Delegates will explore the Act’s applicability, targeting entities and industries most impacted, and the specific requirements that need to be met to achieve compliance.
The workshop will guide you through practical steps on implementing DORA’s directives, navigating its complexities, and integrating its principles into your organizational fabric.
Furthermore, the risks of non-compliance are laid out clearly, highlighting the potential operational and reputational pitfalls. Participants will leave equipped with strategic advice, up-to-date timelines, and the latest updates, empowering them to not only comply with DORA but to leverage it for competitive advantage in an increasingly interconnected digital world.
GDPR Unveiled: Navigating Data Privacy for Empowerment and Compliance
Navigate the complexities of data protection with our expert-led workshop on the General Data Protection Regulation (GDPR), the cornerstone of privacy and data protection in the European Union. As the digital world becomes increasingly data-driven, understanding GDPR is not just a legal obligation but a strategic imperative for businesses globally.
This session will illuminate the intricacies of GDPR, elucidating what it entails and the profound impact it has on the way personal data is collected, stored, and processed. Attendees will engage with the core reasons why GDPR is a pivotal part of regulatory compliance, its relevance in safeguarding personal information, and its influence on consumer trust and corporate responsibility.
The workshop will dissect who falls under the GDPR’s jurisdiction, clarifying the scope of its application from multinational corporations to local enterprises. Experts will guide you through the meticulous process of achieving GDPR compliance, outlining actionable steps and best practices to ensure your organization meets its stringent standards.
Crucially, the workshop will spotlight the consequences of GDPR non-compliance, including the significant financial penalties and reputational damage. Armed with the latest updates, timelines, and expert strategic advice, delegates will emerge with a fortified understanding of GDPR, ready to implement robust data protection strategies that align with the regulation’s demands and champion privacy.
NIS2 in Action: Elevating Cybersecurity Standards Across Europe
Delve into the critical realm of cybersecurity with our specialized workshop on the revised Network Information Systems Directive, commonly referred to as NIS2. This directive represents a significant evolution in cybersecurity regulation, expanding upon its predecessor to fortify the resilience and security of network and information systems across the EU.
Participants will unravel the core components of NIS2, gaining clarity on what the directive encompasses and its crucial role in bolstering national and cross-border cooperation on cybersecurity. The session provides a detailed exposition on why NIS2 is not merely a regulatory requirement but a strategic enhancer for any organization’s cyber defence mechanisms, especially given the heightened cyber threat landscape.
Expert facilitation will identify the entities affected by NIS2, broadening understanding of its reach beyond traditional operators of essential services to a wider array of digital service providers and sectors. Through an interactive and engaging format, delegates will learn the essentials of compliance—how to align with NIS2 standards, implement required security measures, and manage incident reporting obligations effectively.
The risks associated with non-compliance will be laid out transparently, emphasizing the need for a proactive approach to cybersecurity. By the end of the workshop, participants will be equipped with the latest strategic insights, compliance roadmaps, and updates necessary to not only meet NIS2 requirements but to excel in creating a secure and resilient digital infrastructure.
Future-Proofing Cybersecurity: A Deep Dive into the EU Cyber Resilience Act
In an era where cyber threats are escalating, the EU Cyber Resilience Act stands as a crucial piece of legislation aimed at strengthening the cybersecurity of digital products and associated services. Our in-depth workshop on the EU Cyber Resilience Act offers a comprehensive overview of this seminal act, detailing its provisions and the imperative role it plays in establishing a safer digital environment.
Discover the substance of the Act as our expert demystifies its objectives and breaks down its requirements. Understand the importance of the Act for ensuring that hardware and software reaching the EU market meet stringent security standards, safeguarding consumers and enterprises alike.
The session will clarify who will be impacted by the Act, covering manufacturers, distributors, and importers, and delve into the criteria and processes for compliance. Learn about the implications for the product lifecycle, from design to maintenance, and the necessary steps for adherence to cybersecurity norms.
Highlighting the potential legal and financial repercussions of non-compliance, this workshop will arm you with knowledge of risk management techniques and compliance strategies. Emerging from this session, delegates will be poised to navigate the complexities of the EU Cyber Resilience Act and adeptly integrate its mandates into their cybersecurity frameworks.
The EU Cyber Security Act – Enhancing Trust and Security
Elevate your cybersecurity understanding at our focused workshop on the EU Cyber Security Act, a landmark regulation that sets a new standard for the security of network and information systems across the European Union. In this session, you will gain an in-depth perspective on how the Act serves as a keystone in the EU's collective cybersecurity infrastructure.
Our expert will guide attendees through the framework of the EU Cyber Security Act, detailing its objectives to establish a harmonized set of cybersecurity standards. The workshop will cover the Act's relevance in fortifying trust in the digital single market, particularly through the introduction of European cybersecurity certification schemes for products, services, and processes.
You'll receive clarity on who is obliged to comply with the Act, its broader implications for various sectors, and how it integrates with other cybersecurity initiatives. The workshop will articulate the necessary steps for conformity and demonstrate how certification can serve as a competitive differentiator in the market.
Understanding the consequences of non-compliance is vital, and this workshop will discuss the risks, from legal ramifications to the erosion of customer trust. Equipped with current updates and actionable advice, participants will conclude this session ready to apply the Act’s principles, ensuring their cybersecurity practices meet the highest EU standards.
Payment Services Directive II (PSD2) – Revolutionizing Digital Payments
Join our expert-led exploration into the Payment Services Directive II (PSD2), a transformative piece of legislation that is reshaping the European payment services landscape. This directive is not just a regulatory update; it’s a catalyst for innovation, competition, and enhanced security in the digital payments sector.
This session will dissect the intricacies of PSD2, providing a detailed examination of its components, from the stringent security requirements known as Strong Customer Authentication (SCA) to the opening up of the banking industry to third-party payment service providers. Understand the crucial aspects of PSD2 and why it is a game-changer for financial services, promoting a more integrated and efficient European payments market.
Attendees will engage with the practical implications of PSD2 compliance, learning who is affected, from traditional banks to fintech companies, and the specific actions required to comply with this directive. Our specialist will guide you through the process, offering insights into the operational shifts needed and the innovative opportunities that PSD2 presents.
Highlighting the importance of adherence, the workshop will also address the risks and penalties associated with non-compliance. By the end of the session, delegates will be equipped with a comprehensive understanding of PSD2, prepared to navigate the regulatory landscape and to harness the directive’s potential for advancing secure and user-friendly payment solutions.
Critical Entities Resilience (CER) Directive – Fortifying Essential Services
Our targeted workshop on the Critical Entities Resilience (CER) Directive offers an essential guide to one of the most pivotal regulatory frameworks designed to protect essential services across Europe. This directive is at the heart of the EU's mission to enhance the resilience of critical entities against the backdrop of evolving physical and cyber threats.
Within this workshop, our expert will unpack the CER Directive, explaining its key elements and the importance of reinforcing the security of vital sectors, from energy to transportation, banking to health. We will delve into the directive’s expansive scope, which now encompasses a broader range of sectors and sets higher resilience standards than ever before.
Participants will gain insights into the directive’s application, understanding which entities are considered critical and the new obligations they must fulfil to ensure their operational resilience. The workshop will navigate the intricacies of implementing the CER requirements, providing clear guidance on the risk assessment processes, mitigation measures, and incident reporting mechanisms.
The session is also set to highlight the significant implications of non-compliance, addressing the potential impacts on public welfare and safety, as well as on the entities' continuity and reputation. By the conclusion of this workshop, attendees will be well-prepared to integrate the CER Directive’s principles into their strategic planning, ensuring that their operations are resilient in the face of an increasingly complex threat environment.
ePrivacy Directive – Navigating Privacy in the Digital Age
Engage with the subtleties of digital privacy at our focused workshop on the ePrivacy Directive, a key legal framework that regulates privacy and confidentiality in electronic communications within the European Union. This directive complements the GDPR and is instrumental in upholding individuals’ rights to privacy in the digital communications sphere.
Participants will delve into the directive’s provisions, exploring its coverage from traditional telecommunications to new messaging services, and understanding its critical role in protecting users' online activities and personal data. The session will elucidate why the ePrivacy Directive is not only significant for legal compliance but also for maintaining consumer trust and ensuring the integrity of electronic communication services.
Our experts will outline the entities affected by the directive, the compliance requirements for various digital communication channels, and the nuances of consent and data processing. Attendees will be taken through a journey of practical compliance strategies, including the implementation of user-friendly consent mechanisms and secure communication practices.
The workshop will also bring to light the consequences of not adhering to the ePrivacy Directive, such as the legal and reputational risks involved. With actionable insights, attendees will leave with a robust understanding of how to align their operations with the directive, thereby fostering a trusted and privacy-respecting digital environment.
Evolving Compliance: AI, MiCA, EUCS, AMLA, eIDAS and more
Join us for an immersive workshop that traverses the cutting edge of regulatory compliance, covering a spectrum of critical instruments from the EU AI Act to the eIDAS framework. This session is designed to arm participants with a comprehensive understanding of the latest developments and requirements in a rapidly evolving digital landscape, ensuring they stay ahead in the realms of artificial intelligence, crypto-assets, cybersecurity certification, anti-money laundering, and digital identification.
- EU AI Act: Delve into the regulatory framework set to shape the development and deployment of AI systems, focusing on risk assessment, compliance requirements, and ethical considerations.
- Markets in Crypto-Assets (MiCA) framework: Explore the contours of the MiCA framework, designed to regulate crypto-assets, issuers, and service providers, emphasizing market integrity and investor protection.
- European Union Cybersecurity Certification Scheme for Cloud Services (EUCS): Gain insights into the EUCS, a certification scheme that aims to elevate the security standards of cloud services across the EU, fostering trust and compliance.
- Anti-Money Laundering and Countering the Financing of Terrorism Authority (AMLA): Understand the role of AMLA in enhancing the effectiveness of the EU's efforts to prevent money laundering and terrorism financing, with a focus on cross-border cooperation and compliance mechanisms.
- Electronic Identification, Authentication and Trust Services (eIDAS): Unpack the eIDAS regulation, which underpins trust services and electronic identification in the EU, crucial for digital transactions and interactions.
This workshop will provide a platform for interactive learning, guided by experts in each regulatory field. Attendees will engage with the foundational principles, practical compliance strategies, and the implications of non-compliance across these diverse areas. Equipped with the knowledge from this workshop, participants will be prepared to navigate the complexities of these regulations, applying them effectively within their organizations to foster innovation, ensure security, and maintain compliance.
Leveraging NIST CSF 2.0 for Compliance – A Strategic Approach
Embark on a strategic journey to compliance mastery with our workshop focused on leveraging the NIST Cybersecurity Framework (CSF) 2.0. This session is crafted for organizations seeking to enhance their compliance posture through a comprehensive understanding and application of the NIST CSF 2.0. As compliance obligations grow increasingly complex, the ability to measure, manage, and operationalize an effective compliance framework becomes essential.
This workshop will guide attendees through the intricacies of using NIST CSF 2.0 to assess current compliance levels accurately and to identify areas of improvement. Participants will learn how to integrate and operationalize the framework within their organizations, leveraging the efficiencies of cross-mapping the nexus of controls for various compliance requirements.
Our experts will demonstrate how the NIST CSF 2.0 can serve as a cornerstone for developing a robust, scalable, and flexible compliance strategy that addresses multiple regulatory and industry-specific obligations simultaneously.
Attendees will gain practical insights into tailoring the NIST CSF 2.0 to their unique organizational contexts, facilitating a strategic approach to compliance that optimizes resources and enhances overall security posture. By the end of the workshop, participants will be equipped with the knowledge and tools to implement a cohesive framework that not only meets current compliance demands but is also adaptable to future regulatory landscapes.
Principles of Cyber Risk Management – Strategies for Success
Dive deep into the core of cybersecurity and risk management in our engaging workshop designed to arm participants with the fundamental principles needed to navigate the complex landscape of compliance and cyber risk. This session is meticulously crafted to shift the paradigm from a checkbox compliance approach to a risk-centric strategy, essential for today’s dynamic digital threatscape.
Attendees will unravel the essential terminology and methodologies that underpin effective cyber risk management, gaining a solid foundation in the practices that lead to robust cybersecurity postures. Through a blend of theoretical insights and practical applications, the workshop will guide participants in the art and science of control selection, tailored to meet both compliance mandates and risk management goals.
A key focus will be on enhancing communication within organizations and with external stakeholders, employing meaningful metrics that resonate across business functions. By leveraging relevant Key Performance Indicators (KPIs) and Key Risk Indicators (KRIs), the workshop aims to foster a culture of engagement and support, translating complex cybersecurity concepts into actionable insights.
Empowering leadership with key compliance communication strategies will be a cornerstone of this session, ensuring that decision-makers are well-equipped to champion cybersecurity initiatives. Participants will leave with a comprehensive toolkit for implementing a risk management framework that not only aligns with regulatory requirements but also advances the organization's security maturity.
Becoming an Effective Cyber Compliance Leader – Mastering the Soft Skills
Step into the role of a transformative leader with our unique workshop, "How to Become an Effective Cyber Compliance Leader," designed to equip aspiring and current leaders with the crucial soft skills necessary for success in the fast-paced world of cyber compliance. Beyond mastering legislation and technical knowledge, this workshop emphasizes the importance of interpersonal skills, offering insights into engagement strategies for both internal and external stakeholders.
Participants will explore a variety of critical soft skills including advanced presentation techniques, the art of persuasion to "sell" compliance initiatives as organizational benefits, and comprehensive communication strategies that encompass verbal, written, and digital interactions. Recognizing the importance of continuous learning and adaptability, the session provides tools and resources for career development and staying abreast of the latest in cybersecurity and compliance.
Furthermore, the workshop delves into personal well-being, offering strategies for managing the mental health and stress that often accompany the responsibilities of cyber compliance leadership. Attendees will learn how to maintain energy and effectiveness, ensuring they can lead by example and inspire their teams. Practical tips for work-life balance, mental resilience, and staying motivated in a demanding field will be covered, enabling leaders to sustain their performance over the long term.
By integrating these soft skills with their technical knowledge, workshop participants will be prepared to lead their organizations to new heights in cyber compliance, fostering a culture of security, compliance, and well-being.
Navigating the Cyber Compliance Ecosystem – Key Players and Their Roles
Delve into the intricate web of organizations and authorities that shape the cyber compliance landscape in Europe and beyond with our workshop, "Navigating the Cyber Compliance Ecosystem – Key Players and Their Roles." This session is meticulously designed to offer delegates a panoramic view of the entities that play a pivotal role in establishing, enforcing, and guiding cyber compliance standards and practices.
From the European Union Agency for Cybersecurity (ENISA) and the European Central Bank (ECB) to the European Supervisory Authorities (ESAs) and National Competent Authorities, participants will gain insights into the functions and impact of these critical bodies. The workshop will extend its scope to include National Cyber Security Centres (NCSCs) across Europe, highlighting their roles in safeguarding national cybersecurity interests and cooperating at the EU level.
In addition to exploring the contributions of law enforcement agencies like Europol, the session will broaden its horizon to encapsulate influential bodies and frameworks outside of Europe, such as those in the USA and Singapore. This global perspective ensures a comprehensive understanding of the international cyber compliance dialogue and its implications for entities operating within and outside the EU.
The objective of this workshop is to equip delegates with the knowledge to navigate the complex network of cyber compliance entities effectively. Understanding the roles, responsibilities, and interconnections of these key players will empower participants to better anticipate and respond to compliance requirements, collaborate with authorities, and leverage insights for strategic decision-making in cybersecurity and compliance.
A Multifaceted Format
A Call to Excellence
Streamed Live
On Demand for a Month
"IT TAKES A NETWORK TO DEFEAT A NETWORK"
Target Audience
- Cybersecurity Professionals: Those responsible for protecting organizational IT infrastructure from cyber threats, including Security Analysts, Cybersecurity Engineers, and Chief Information Security Officers (CISOs).
- Compliance Officers/Managers: Individuals tasked with ensuring that organizational practices comply with relevant laws, regulations, and policies, particularly in the cyber and data protection domains.
- IT Managers and Directors: Those overseeing IT departments, ensuring the alignment of IT strategies with business objectives, including the integration of cybersecurity measures.
- Risk Managers: Professionals focused on identifying, analysing, and mitigating risks, especially cyber risks, within organizations.
- Data Protection Officers (DPOs): Designated officers responsible for overseeing data protection strategy and compliance with data protection regulations such as the GDPR.
- Legal Professionals Specializing in Cyber Law: Lawyers and legal advisors who specialize in the legal aspects of cybersecurity and data protection, advising organizations on compliance with cybersecurity laws and regulations.
- Chief Compliance Officers: Executives responsible for overseeing and managing regulatory compliance issues within an organization.
- Regulatory Affairs Professionals: Individuals who liaise with regulatory bodies and ensure that organizations comply with all applicable regulations, standards, and laws.
- IT Auditors: Professionals who assess the effectiveness of an organization’s IT systems, ensuring compliance with regulatory standards and identifying potential security weaknesses.
- Chief Executive Officers (CEOs) and Other C-Level Executives: Senior executives interested in understanding the implications of cybersecurity and compliance on corporate strategy, governance, and risk management.
- Business Continuity Planners: Professionals responsible for developing strategies to maintain business functions in the event of cyber threats and incidents.
- Network and Systems Administrators: IT professionals responsible for the daily operation of computer networks, who need to understand cybersecurity risks and compliance requirements
- Human Resources Professionals: Those involved in crafting policies and training programs related to cybersecurity awareness and compliance within the organization.
- Project Managers in IT and Cybersecurity Projects: Individuals overseeing projects related to IT, cybersecurity, and compliance, ensuring projects adhere to regulatory requirements.
- Educators and Academic Researchers: Those involved in the study or teaching of cybersecurity, cyber law, and compliance, looking to update their knowledge and incorporate the latest trends and regulations into their curricula.
- Cybersecurity Innovators, Entrepreneurs, and Solution Providers: Visionary leaders and creators in the cybersecurity space who aim to deepen their understanding of compliance challenges. They seek to identify opportunities for innovation, developing cutting-edge solutions and services that address the complex compliance needs of their clients, gaining insights into emerging trends, regulatory requirements, and the evolving threat landscape.
EU DORA SUMMIT 2024
EU CYBER AWARDS 2022
EU CYBER SUMMIT 2018
EU CYBER SUMMIT 2017
EU CYBER SUMMIT 2017
EU CYBER SUMMIT 2016
CYBER LEADERS LUNCH 2016
CYBER THREAT SUMMIT 2012
CYBER THREAT SUMMIT 2011
THE FIRST SUMMIT - 2011
EU CYBER SUMMIT 2018
Sponsorship Opportunities
Rhonda Reihill
Events Director
P: +353-(0)1-905 3263
M: +353-(0)87 738 8990
E: rhonda@icttf.org
Request Sponsorship Information
HEAD OFFICE
-
ICTTF Ltd
Unit 8, Kinsealy Business Park,
Kinsealy Lane,
Malahide,
Co Dublin
K36 CX92 -
info@icttf.org
support@icttf.org -
+353 (0)1 905 3263